Offline Cybersecurity Knowledge Base
β202Mar 2, 2026Updated this week
Alternatives and similar repositories for Dojo-101
Users that are interested in Dojo-101 are comparing it to the libraries listed below
Sorting:
- Web Server Vulnerability Scanning Toolβ36Mar 11, 2025Updated 11 months ago
- π EclipseRecon is a personal project developed during my cybersecurity learning journey π‘οΈ. It helps practice web reconnaissance π by β¦β28Nov 26, 2025Updated 3 months ago
- A cybersecurity tool designed to safeguard against IDN Homograph Attacksβ45Aug 5, 2025Updated 7 months ago
- The official website for The Discord Analytics for Risks & Threats Project.β22Dec 29, 2025Updated 2 months ago
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passworβ¦β40May 7, 2023Updated 2 years ago
- Fast and easy to use CLI-based file encryption program π¦β13Oct 12, 2025Updated 4 months ago
- one-stop resource for all things offensive security.β177Feb 21, 2026Updated 2 weeks ago
- Burp Suite extension for testing Passkey systems.β75Apr 1, 2025Updated 11 months ago
- A fast, customizable service detection tool powered by a flexible fingerprint system. It helps you identify services, APIs, and network cβ¦β41Feb 7, 2026Updated last month
- BlueSky OSINT Toolβ14Dec 10, 2024Updated last year
- π₯οΈ Windows π A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during β¦β54Jan 26, 2026Updated last month
- Nakamoto is a 2 layer encryption tool to protect your data and your cyptocurrencyβ15Nov 13, 2025Updated 3 months ago
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.β79Sep 1, 2025Updated 6 months ago
- A collection of Turbo Intruder scripts.β71Feb 1, 2025Updated last year
- An OpenAI API Compatible Honeypot Gatewayβ17Mar 17, 2025Updated 11 months ago
- Autonomous AI C2β33Jul 23, 2024Updated last year
- Security tool against dependency typosquatting attacksβ54Feb 25, 2026Updated last week
- FrogPost: postMessage Security Testing Toolβ108Dec 4, 2025Updated 3 months ago
- β16Jun 28, 2025Updated 8 months ago
- β23Mar 4, 2025Updated last year
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessmentsβ142Jan 2, 2025Updated last year
- Steganography Tool for JPG Imagesβ64Feb 23, 2026Updated last week
- Create tar/zip archives that try to exploit zipslip vulnerability.β48Sep 20, 2024Updated last year
- AI-Native Static Code Analysis for modern security teams. Built for finding vulnerabilities, advanced structural search, derive insights β¦β110Updated this week
- Identify hardcoded secrets in static structured text (version 2)β98Feb 5, 2025Updated last year
- π‘οΈProactive ransomware defense for Windows, providing secure file hiding through camouflage, encrypted mappings, smart shortcuts and seaβ¦β16Oct 14, 2025Updated 4 months ago
- Home of https://redteam.guideβ15Sep 19, 2022Updated 3 years ago
- If these strings are in your code, you might have a problem!β51Feb 13, 2026Updated 3 weeks ago
- CLI to prevent malicious Terraform Providers from being executed. You can define the allow list of Terraform Providers and their versionsβ¦β88Feb 25, 2026Updated last week
- eBPF Memory Dump Toolβ100Feb 26, 2026Updated last week
- AcSecurity is a Python module designed to scan applications for common security vulnerabilities. It checks for hardcoded secrets, dependeβ¦β16Aug 29, 2025Updated 6 months ago
- Addon for BHCEβ58Apr 1, 2025Updated 11 months ago
- If you a security engineer or an aspirant Security professional then Setting up a Wazuh home lab environment is an excellent way for SOC β¦β18Mar 27, 2024Updated last year
- Hijack a slack bot to phish your way inβ57Jul 17, 2025Updated 7 months ago
- When good OAuth apps go rogue. Documents observed OAuth application tradecraftβ84Jan 30, 2026Updated last month
- ChainReactor is a research project that leverages AI planning to discover exploitation chains for privilege escalation on Unix systems. Tβ¦β60Nov 3, 2024Updated last year
- A very simple open source implementation of Google's Project Naptimeβ182Mar 27, 2025Updated 11 months ago
- A web honeypot library to create vulnerable-looking endpoints to detect and mislead attackersβ433Jan 14, 2025Updated last year
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.β62Nov 19, 2025Updated 3 months ago