Aif4thah / Dojo-101View external linksLinks
Offline Cybersecurity Knowledge Base
β200Updated this week
Alternatives and similar repositories for Dojo-101
Users that are interested in Dojo-101 are comparing it to the libraries listed below
Sorting:
- Web Server Vulnerability Scanning Toolβ36Mar 11, 2025Updated 11 months ago
- π EclipseRecon is a personal project developed during my cybersecurity learning journey π‘οΈ. It helps practice web reconnaissance π by β¦β28Nov 26, 2025Updated 2 months ago
- A cybersecurity tool designed to safeguard against IDN Homograph Attacksβ45Aug 5, 2025Updated 6 months ago
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passworβ¦β40May 7, 2023Updated 2 years ago
- Fast and easy to use CLI-based file encryption program π¦β13Oct 12, 2025Updated 4 months ago
- one-stop resource for all things offensive security.β177Feb 3, 2026Updated last week
- Burp Suite extension for testing Passkey systems.β75Apr 1, 2025Updated 10 months ago
- A fast, customizable service detection tool powered by a flexible fingerprint system. It helps you identify services, APIs, and network cβ¦β41Updated this week
- BlueSky OSINT Toolβ14Dec 10, 2024Updated last year
- Nakamoto is a 2 layer encryption tool to protect your data and your cyptocurrencyβ15Nov 13, 2025Updated 3 months ago
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.β75Sep 1, 2025Updated 5 months ago
- A collection of Turbo Intruder scripts.β69Feb 1, 2025Updated last year
- Security tool against dependency typosquatting attacksβ54Updated this week
- FrogPost: postMessage Security Testing Toolβ108Dec 4, 2025Updated 2 months ago
- β16Jun 28, 2025Updated 7 months ago
- β23Mar 4, 2025Updated 11 months ago
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessmentsβ141Jan 2, 2025Updated last year
- JPG steganography toolβ64Jan 9, 2026Updated last month
- Create tar/zip archives that try to exploit zipslip vulnerability.β48Sep 20, 2024Updated last year
- AI-Native Static Code Analysis for modern security teams. Built for finding vulnerabilities, advanced structural search, derive insights β¦β104Updated this week
- Identify hardcoded secrets in static structured text (version 2)β97Feb 5, 2025Updated last year
- π‘οΈProactive ransomware defense for Windows, providing secure file hiding through camouflage, encrypted mappings, smart shortcuts and seaβ¦β16Oct 14, 2025Updated 3 months ago
- eBPF Memory Dump Toolβ99Aug 26, 2025Updated 5 months ago
- Addon for BHCEβ58Apr 1, 2025Updated 10 months ago
- If you a security engineer or an aspirant Security professional then Setting up a Wazuh home lab environment is an excellent way for SOC β¦β16Mar 27, 2024Updated last year
- Hijack a slack bot to phish your way inβ57Jul 17, 2025Updated 6 months ago
- When good OAuth apps go rogue. Documents observed OAuth application tradecraftβ84Jan 30, 2026Updated 2 weeks ago
- ChainReactor is a research project that leverages AI planning to discover exploitation chains for privilege escalation on Unix systems. Tβ¦β59Nov 3, 2024Updated last year
- A very simple open source implementation of Google's Project Naptimeβ184Mar 27, 2025Updated 10 months ago
- A web honeypot library to create vulnerable-looking endpoints to detect and mislead attackersβ435Jan 14, 2025Updated last year
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.β61Nov 19, 2025Updated 2 months ago
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.β109May 30, 2025Updated 8 months ago
- Performs review of Entra ID users and their assigned roles based on least privilege principle and actual Entra ID operations performed wiβ¦β30Feb 6, 2026Updated last week
- Autopsy Module to analyze Registry Hivesβ15Feb 18, 2022Updated 3 years ago
- RequestShield is a 100% Free and OpenSource tool designed to analyze HTTP access.logs and identify suspicious HTTP requests and potentialβ¦β106Dec 2, 2024Updated last year
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysisβ¦β509Feb 6, 2026Updated last week
- Protection against HTML smuggling attacks.β101Jul 10, 2025Updated 7 months ago
- Automated vulnerability discovery and annotationβ68Jul 26, 2024Updated last year
- β39Oct 18, 2024Updated last year