Offline Cybersecurity Knowledge Base
☆204Mar 2, 2026Updated 3 weeks ago
Alternatives and similar repositories for Dojo-101
Users that are interested in Dojo-101 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Vulnerable API for research and education☆54Feb 25, 2026Updated last month
- Web Server Vulnerability Scanning Tool☆36Mar 11, 2025Updated last year
- 🌑 EclipseRecon is a personal project developed during my cybersecurity learning journey 🛡️. It helps practice web reconnaissance 🌐 by …☆29Nov 26, 2025Updated 4 months ago
- The official website for The Discord Analytics for Risks & Threats Project.☆22Dec 29, 2025Updated 3 months ago
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆41May 7, 2023Updated 2 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Fast and easy to use CLI-based file encryption program 📦☆13Oct 12, 2025Updated 5 months ago
- Burp Suite extension for testing Passkey systems.☆75Apr 1, 2025Updated 11 months ago
- one-stop resource for all things offensive security.☆178Feb 21, 2026Updated last month
- An OpenAI API Compatible Honeypot Gateway☆17Mar 17, 2025Updated last year
- A cybersecurity tool designed to safeguard against IDN Homograph Attacks☆46Aug 5, 2025Updated 7 months ago
- 🖥️ Windows 🚀 A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during …☆54Jan 26, 2026Updated 2 months ago
- FrogPost: postMessage Security Testing Tool☆108Dec 4, 2025Updated 3 months ago
- Nakamoto is a 2 layer encryption tool to protect your data and your cyptocurrency☆15Nov 13, 2025Updated 4 months ago
- A few XDR Scripts☆22Mar 19, 2025Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A collection of Turbo Intruder scripts.☆71Feb 1, 2025Updated last year
- Rogue.sh is an automated Bash script for Linux systems that performs Nmap scans, sets up Metasploit, exploits vulnerabilities, downloads …☆14Aug 20, 2025Updated 7 months ago
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.☆78Sep 1, 2025Updated 6 months ago
- If you a security engineer or an aspirant Security professional then Setting up a Wazuh home lab environment is an excellent way for SOC …☆18Mar 27, 2024Updated 2 years ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Sep 20, 2024Updated last year
- Security tool against dependency typosquatting attacks☆55Updated this week
- eBPF Memory Dump Tool☆102Updated this week
- If these strings are in your code, you might have a problem!☆51Feb 13, 2026Updated last month
- Steganography Tool for JPG Images☆64Mar 22, 2026Updated last week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆142Jan 2, 2025Updated last year
- Autonomous AI C2☆33Jul 23, 2024Updated last year
- Personal pentest notes and playbooks<3☆33Jan 7, 2026Updated 2 months ago
- AI-Native Static Code Analysis for modern security teams. Built for finding vulnerabilities, advanced structural search, derive insights …☆112Mar 23, 2026Updated last week
- Vulnerability research assistant that locates calls to potentially insecure API functions in a binary file.☆112Updated this week
- Web Hacking Cheat Sheet for Recon | Attacks | Tools & Resources☆25Apr 25, 2021Updated 4 years ago
- Addon for BHCE☆58Apr 1, 2025Updated 11 months ago
- Putting a leash on naughty AWS permissions☆135Sep 5, 2025Updated 6 months ago
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆111May 30, 2025Updated 9 months ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆84Mar 19, 2026Updated last week
- ☆90Feb 12, 2025Updated last year
- AcSecurity is a Python module designed to scan applications for common security vulnerabilities. It checks for hardcoded secrets, depende…☆16Aug 29, 2025Updated 7 months ago
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.☆45Apr 21, 2025Updated 11 months ago
- Validate the isolation posture of your container environment.☆314Feb 11, 2026Updated last month
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆62Jan 25, 2025Updated last year
- Open source templates you can use to bootstrap your security programs☆897Dec 28, 2025Updated 3 months ago