BeeHiveSafety / KnowledgeBaseLinks
Open Source and publicly modifiable knowledgebase about CyberSecurity Topics, Concepts, and Terminology. This replaces our prior repo which included basic install guides and tools.
☆20Updated 4 months ago
Alternatives and similar repositories for KnowledgeBase
Users that are interested in KnowledgeBase are comparing it to the libraries listed below
Sorting:
- Rubber Ducky powered by NeoKey☆25Updated last year
- Directory with Bluetooth exploits that is used in BlueToolkit☆14Updated 4 months ago
- Encodes a message using emojis based on a specified pattern.☆17Updated last year
- Find open databases - Powered by Binaryedge.io☆15Updated 5 years ago
- Crack passwords with Hashcat using a Discord Bot.☆26Updated last year
- Tools for optimizing and handling the SSID pool for the WiFi Pineapple Mark VII.☆20Updated 2 years ago
- Our fork of Iceman's fork for Proxmark III☆16Updated 5 months ago
- Monitor 802.11 probe requests from a capture file or network sniffing!☆32Updated 3 months ago
- A VS Code Extension to import USB Rubber Ducky keystroke injection payloads quickly!☆11Updated last year
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7Updated 3 years ago
- HID payloads for good purpose☆10Updated 5 months ago
- LCD GUI for P4wnP1 ALOA☆21Updated 2 years ago
- One BadUSB to rule them all using ATmega32U4☆21Updated 4 years ago
- an open source repository of courses, hence, "OpenCourse". The free and open-sourceness of this repository ensure a privacy respecting le…☆24Updated 2 years ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated last year
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆18Updated 2 years ago
- Enumeration & fingerprint tool☆24Updated last year
- Terminal based fake identity generator.☆26Updated last year
- Windows Remote Administration Tool that uses Discord as C2☆29Updated 2 years ago
- The Kill-The-Code Python Program provides a robust mechanism for remotely controlling code execution by monitoring a specified URL for a …☆16Updated 10 months ago
- An embedded key/value database for Go.☆11Updated 3 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated 10 months ago
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆14Updated 2 years ago
- Monitor malware scanning services for your payloads☆11Updated 3 years ago
- Legba recipes.☆50Updated 9 months ago
- Force target victim to unsafe network☆23Updated last week
- Pentesting Suite☆28Updated last year
- An Open Source Intelligence Framework to investigate and keep track of the investigation of a certain individual☆15Updated last year
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆17Updated 3 years ago
- Modular framework to exploit UPS devices☆63Updated 2 years ago