Brute-f0rce / ResourcesLinks
Resources for Cyber Security
☆10Updated 6 years ago
Alternatives and similar repositories for Resources
Users that are interested in Resources are comparing it to the libraries listed below
Sorting:
- 🕷️MITMProxy + Ettercap = PWNd☆11Updated 6 years ago
- List of sources for cybersecurity news☆37Updated 2 years ago
- Wordlist generated using leaked databases, Pipal, and CUPP.☆33Updated 7 years ago
- Offensive security use cases of ChatGPT☆75Updated 2 years ago
- Networks and Tools that are used to access and navigate on "darknets"☆50Updated 11 months ago
- Another Quality Modpack 2 - Server Configs☆6Updated 3 years ago
- Master of Science in Cybersecurity, Sapienza University of Rome.☆49Updated 6 months ago
- The hacker technical cheat sheet☆39Updated last week
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆34Updated last month
- This repository contains all my penetration testing study notes, penetration testing tools, scripts, techniques, tricks and also many scr…☆9Updated 7 months ago
- ☆43Updated 10 months ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Updated 3 years ago
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆39Updated 3 years ago
- Source of swisskyrepo.github.io - Public☆23Updated last month
- Hacker calendar 2024 in high resolution + template + some editing tips☆22Updated last year
- Conduct forensic investigation of suspicious domains, websites and other dangerous thing without the fear of being infected! A Live opera…☆18Updated 2 years ago
- Scrape Pastebin API to collect daily pastes, setup a wordlist and be alerted by email when you have a match.☆49Updated 4 months ago
- 🖥️ A reveal.js website for presenting the cyber security basics to humans☆31Updated 2 years ago
- ☆20Updated last year
- Powershell implementation of a novel technique. Invoke-GPTObfuscation is a PowerShell Obfuscator that utilizes OpenAI (and other APIs) to…☆49Updated last year
- Offensive Security Vault structure for Obsidian☆19Updated 2 years ago
- ☆16Updated 2 years ago
- How long will it take to crack a hash ?☆29Updated 5 years ago
- Another random blog about security☆9Updated this week
- Write-Ups for TryHackMe☆21Updated 4 years ago
- This project is a tool for detecting nudity in images, allowing users to analyze both local images and images from URLs. It utilizes the …☆12Updated 8 months ago
- 🐠 A simple Google query builder for document file discovery☆27Updated 2 months ago
- 📒 Quick script to generate a table of contents from a markdown document☆15Updated 2 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆35Updated 4 years ago
- Simple FREE guide to set up TOR stealth and persistence with complete anonymity.☆62Updated 3 years ago