An auxiliary spellcheck dictionary that corresponds with the Bishop Fox Cybersecurity Style Guide
☆94Mar 10, 2023Updated 2 years ago
Alternatives and similar repositories for cyberdic
Users that are interested in cyberdic are comparing it to the libraries listed below
Sorting:
- Stratosphere uses password generation algorithms to discover publicly accessible cloud storage buckets.☆31Jul 15, 2021Updated 4 years ago
- Go module that returns supported regions for a service or supported services for a region☆18Dec 12, 2025Updated 2 months ago
- Repo for hosting various scripts for creating users for password spraying and other password attacks.☆11Jul 9, 2020Updated 5 years ago
- Web application that lets you test if your domain is vulnerable to email spoofing☆41Mar 5, 2019Updated 6 years ago
- A Burp Suite extension for identifying missing Subresource Integrity attributes.☆13Jun 12, 2019Updated 6 years ago
- This is a Burpsuite plugin built to enable you to import your directory bruteforcing results into burp for easy viewing later. This is an…☆36Mar 1, 2023Updated 3 years ago
- Everything about xss protection technology☆14Oct 22, 2019Updated 6 years ago
- Assists in mass exportation of Nessus scans☆19Apr 20, 2018Updated 7 years ago
- Hacked together script for feeding urls into Burp's Sitemap☆92Dec 7, 2025Updated 2 months ago
- 🔍 gowitness - a golang, web screenshot utility using Chrome Headless☆13May 31, 2019Updated 6 years ago
- The God Name Server☆36Updated this week
- Scans SMB for Vuln Assessment☆17Mar 4, 2017Updated 9 years ago
- Some Templates for Bash Scripting☆17Sep 30, 2022Updated 3 years ago
- Insecure Deserialization, PDF and lab☆18Nov 19, 2019Updated 6 years ago
- Listing of my writeups from HackTheBox, VulnHub, TryHackMe, others...☆19May 26, 2021Updated 4 years ago
- The WASM Based Security Toolkit for the Web First Paradigm☆36Oct 3, 2023Updated 2 years ago
- This is a web application fuzzer scanner - the goal was CLI flexibility and rapid prototyping☆48Nov 12, 2019Updated 6 years ago
- Auto Recon Bash Script☆31Dec 31, 2024Updated last year
- Curated list of public penetration test reports released by several consulting firms and academic security groups☆20Mar 17, 2021Updated 4 years ago
- Proof of Concept code for CVE-2015-0345 (APSB15-07)☆22Jun 12, 2015Updated 10 years ago
- Bindings for the NaCL implementation of Salsa20 and XSalsa20 by D. J. Bernstein☆32Jan 17, 2020Updated 6 years ago
- AWS S3 Bucket Finder.☆14Oct 28, 2025Updated 4 months ago
- ☆24Jun 29, 2020Updated 5 years ago
- HTTP(s) Screenshots for Pen Testers Who Value Their Time☆85Nov 21, 2024Updated last year
- HTML5 Training material for Attack and Secure training sessions.☆43Feb 25, 2023Updated 3 years ago
- A tool for fetching archived URLs (to be rewritten in Go).☆41Jul 19, 2018Updated 7 years ago
- This is a Burp extension for adding additional payloads to active scanner that require out-of-band validation. Works great with XSSHunter☆20Feb 16, 2017Updated 9 years ago
- Anti-Anti-Automation Framework☆100Aug 18, 2014Updated 11 years ago
- Proof of concept - Covert Channel using Windows Filtering Platform (C#)☆21Aug 29, 2021Updated 4 years ago
- ☆128May 22, 2023Updated 2 years ago
- For finding secrets, tokens and other common mistakes made by developers.☆12Oct 21, 2025Updated 4 months ago
- FutureTrust analyzes electronic identification (eID) services in Europe and beyond. It is funded within the EU Framework Programme for Re…☆12Nov 16, 2022Updated 3 years ago
- A PoC .net shell which uses a GitHub.com repository for the communication channel.☆11Oct 25, 2018Updated 7 years ago
- Add your configs for tmux☆18Apr 3, 2022Updated 3 years ago
- PowerShell Module that converts MSG files to EML files☆11Sep 5, 2019Updated 6 years ago
- XLSX parser for nessus and nmap scan results.☆12Nov 22, 2019Updated 6 years ago
- Out-of-the-Box Tool to Obfuscate Excel XLS. Include Obfuscation & Hide for Cell Labels & BoundSheets☆48Aug 4, 2021Updated 4 years ago
- This script is intended to automate your reconnaissance process in an organized fashion☆39Aug 5, 2019Updated 6 years ago
- The wordlists that have been compiled using disclosed reports at HackerOne bug bounty platform☆10Jun 28, 2020Updated 5 years ago