Aif4thah / Dojo-101Links
Offline Cybersecurity Knowledge Base
β192Updated this week
Alternatives and similar repositories for Dojo-101
Users that are interested in Dojo-101 are comparing it to the libraries listed below
Sorting:
- A powerful scanner to scan your Filesystem, S3, MySQL, Redis, Google Cloud Storage and Firebase storage for PII and sensitive data.β460Updated this week
- π΄ββ οΈ Hacking Guides, Demos and Proof-of-Concepts π₯·β211Updated 3 months ago
- β244Updated 2 months ago
- ZeroTrace is a powerful ethical hacking tool for anonymization, routing all your system network traffic through the Tor network, making iβ¦β148Updated 3 weeks ago
- Security automation with n8n ideas: 100+ Red/Blue/AppSec workflows, integrations, and ready-to-run playbooks.β213Updated 2 months ago
- π₯· SecArchive - Cybersecurity Resource Collection A curated archive of high-quality resources for learning cybersecurity, bug bounty, etβ¦β311Updated last month
- β317Updated last year
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.β75Updated 3 months ago
- A visual reference of 118 essential red team tools, frameworks & standards, organized like a periodic table. Includes a printable PDF verβ¦β125Updated last month
- An archive of 0day.today exploitsβ314Updated 4 months ago
- API Pentesting Tools are specialized security tools used to test and analyze the security of Application Programming Interfaces (APIs).β226Updated 8 months ago
- SOAR Automation with Shuffle, Wazuh & TheHive | This project integrates Shuffle SOAR, Wazuh SIEM, and TheHive to automate security incideβ¦β116Updated 9 months ago
- Quick scripts I developed to streamline OSCP tasksβ199Updated 5 months ago
- π LFIer is a powerful and efficient tool for detecting Local File Inclusion (LFI) vulnerabilities in web applications.β54Updated 11 months ago
- π PANO: Advanced OSINT investigation platform combining graph visualization, timeline analysis, and AI assistance to uncover hidden connβ¦β327Updated 7 months ago
- Custom templates for OSINT investigations designed to advance pivoting.β146Updated last year
- Derrick is an advanced data leak scanning and CVE vulnerability analysis tool, designed for cybersecurity researchers and digital defenseβ¦β31Updated 9 months ago
- A Powerful Network Reconnaissance Tool for Security Professionalsβ106Updated 11 months ago
- A curated list of essential digital forensics tools used for investigation, data recovery, and security analysis. These tools help in disβ¦β95Updated 8 months ago
- DPULSE - Tool for complex approach to domain OSINTβ155Updated this week
- β133Updated 6 months ago
- Modern honeypot supporting multiple services, realistic website cloning, and AI-powered featuresβ152Updated last week
- DECeption with Evaluative Integrated Validation Engine (DECEIVE): Let an LLM do all the hard honeypot work!β268Updated 5 months ago
- CyberSecurity BLUE TEAM containerized platform that brings together open-source tools for SIEM, DFIR, CTI, SOAR, and Network Analysisβ391Updated last month
- My notes while studying for the PNPT from TCM Security.β82Updated last year
- A command-line tool to query the DeHashed API. Easily search for various parameters like usernames, emails, hashed passwords, IP addresseβ¦β252Updated 5 months ago
- This repository contains a list of roadmaps I created with my suggestions on LinkedIn and Twitter.π€π»πβ212Updated 2 years ago
- One Liner OSINT is a collection of powerful one-liner commands for Open-Source Intelligence (OSINT) gathering.β50Updated 8 months ago
- Pentesting and Bug Bounty Notes, Cheetsheets and Guide for Ethical Hacker, Whitehat Pentesters and CTF Players.β571Updated last week
- A curated list of OSINT tools for company research, internet scanning, DNS, and Whois lookups, organized for easy access. Ideal for analyβ¦β204Updated last year