Brute-f0rce / ResourcesLinks
Resources for Cyber Security
☆11Updated 6 years ago
Alternatives and similar repositories for Resources
Users that are interested in Resources are comparing it to the libraries listed below
Sorting:
- Simple FREE guide to set up TOR stealth and persistence with complete anonymity.☆63Updated 3 years ago
- Networks and Tools that are used to access and navigate on "darknets"☆49Updated last year
- List of sources for cybersecurity news☆39Updated 2 years ago
- 🕷️MITMProxy + Ettercap = PWNd☆12Updated 6 years ago
- 🐠 A simple Google query builder for document file discovery☆27Updated 5 months ago
- Offensive security use cases of ChatGPT☆77Updated 2 years ago
- This repository contains my work done on the virtual internship provided by Australia's NSW Government on part-time job analysis of the w…☆10Updated 5 years ago
- Agile Sandbox for analyzing Windows, Linux and macOS malware and execution behaviors☆73Updated last year
- Wordlist generated using leaked databases, Pipal, and CUPP.☆34Updated 7 years ago
- 🖥️ A reveal.js website for presenting the cyber security basics to humans☆31Updated 2 years ago
- Offensive Security Vault structure for Obsidian☆20Updated 2 years ago
- Personal Docker Image with Pentest tools and zsh plugins, inspired by Nutek-Terminal and runs on a base Kali Image.☆11Updated last year
- A reconnaissance tool for ethical hackers written in RUST☆20Updated last year
- open source vulnerability scanner and information gathering tool☆14Updated 7 months ago
- Master of Science in Cybersecurity, Sapienza University of Rome.☆52Updated 10 months ago
- A Network Automation framework focused on Cyber-Security☆48Updated 2 years ago
- Hacker calendar 2024 in high resolution + template + some editing tips☆22Updated last year
- This project is a tool for detecting nudity in images, allowing users to analyze both local images and images from URLs. It utilizes the …☆15Updated 11 months ago
- Manage and access your Kali Linux or Parrot Security VM from the terminal (SSH support + file sharing, especially convenient during CTFs,…☆21Updated last month
- 💽 A quick tool for determining and comparing approximate capacity, speed and fault tolerance of different RAID configurations☆30Updated last year
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, website…☆13Updated 3 years ago
- this is a small script for extracting questions from try hack me room ,and creating a MD file☆12Updated 2 years ago
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆40Updated 3 years ago
- A curated list of tools useful within the field of cyber security, for both blue and red team operations.☆97Updated 9 months ago
- Security audit script decreases info gathering from average of 5 minutes, to 20 seconds, and returns everything into a textfile.☆11Updated last year
- Meticulously curated security notes with Emphasis on Application Security, DevSecOps, Cloud Computing, and Penetration Testing.☆137Updated last year
- OSINT mapping using Twitter, Ficklr, Shodan and Insecam☆22Updated 2 years ago
- Docker container for the gophish phishing framework.☆52Updated this week
- Awesome collection of resources 😎 Work in progress🔥☆137Updated this week
- Simple Go Discord Bot☆23Updated 2 years ago