BeanBagKing / SecurityNewsLinks
Lists of Social Media, News sites, and other things to follow
☆41Updated 8 months ago
Alternatives and similar repositories for SecurityNews
Users that are interested in SecurityNews are comparing it to the libraries listed below
Sorting:
- Are.We.Secure.Yet Framework aims to test the wifi security of a location, attempting to locate individual devices☆40Updated 2 years ago
- list of all the pastebins across all protocols (Tor, ZeroNet, etc.)☆42Updated 5 years ago
- internet monitoring osint telegram bot for windows☆155Updated 2 years ago
- Collaborative programming environment inside GitHub Actions – like Google Docs for hacking☆71Updated 2 years ago
- A honeypot that can be used to observe traffic directed at home routers.☆20Updated 6 years ago
- Check if your provider is blocking you!☆105Updated 3 years ago
- All the tools you need to make your own mind up from the Open Data Sets☆139Updated 2 years ago
- Let's brute force this hotel's tv.☆81Updated 5 years ago
- List of companies or individuals offering cybersecurity services, data, or other tangible assets to assist in Ukraine's defense of its in…☆67Updated 3 years ago
- Resource Dump For Learning Cybersec-related Concepts☆25Updated 5 years ago
- Your Friendly Neighbourhood Honeypot Maker and Manager☆33Updated 6 years ago
- List of sources for cybersecurity news☆36Updated 2 years ago
- evil mass storage *AT90USBKEY2 (poc-malware-tool for offline system)☆31Updated 2 years ago
- Full malware Kit☆57Updated 4 years ago
- A Python Script To Automatically Download, Provision and Update a Kali Linux VM in Virtualbox☆46Updated 4 years ago
- Freedom Shield was developed to protect the rights of individuals to peaceably assemble and petition their government.☆73Updated 5 years ago
- An all-in-one briefcase for pentesting, OSINT and radio exploration☆80Updated 6 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆37Updated 4 years ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆13Updated 4 years ago
- Auto discover and exploit LAN raspberry pi's☆108Updated last year
- A tiny set of helper scripts for ipinfo☆17Updated 5 years ago
- Convert MacOS plist password file to hash file for password crackers☆37Updated 6 years ago
- Collection of CVEs from Sick Codes, or collaborations on https://sick.codes security research & advisories.☆89Updated 3 years ago
- a cli google client that bypasses captcha and rate limiting by using the google alerts "preview" feature☆48Updated 2 years ago
- Simple FREE guide to set up TOR stealth and persistence with complete anonymity.☆63Updated 3 years ago
- Scapy: the Python-based interactive packet manipulation program & library. Supports Python 2 & Python 3.☆31Updated 3 years ago
- Papers, presentations and documents from the team at Hacker House.☆51Updated 6 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Updated 11 years ago
- A Proof-of-Concept Layer 2 Denial of Service Attack that disrupts low level operations of Programmable Logic Controllers within industria…☆31Updated 3 years ago
- CLI tools using Harpoon features☆21Updated last year