π Welcome to the Cyber Library your ultimate resource for everything cybersecurity.
β30Dec 18, 2025Updated 2 months ago
Alternatives and similar repositories for Cyber-Library
Users that are interested in Cyber-Library are comparing it to the libraries listed below
Sorting:
- DNSCat PNG Extractor is a Python tool designed for the extraction of PNG image data from DNS exfiltration attempts using DNScatβ10Nov 15, 2023Updated 2 years ago
- Bot Snapchat Appium iOSβ20Jun 7, 2025Updated 8 months ago
- SNMPv3 Authentication Bruteforcerβ39Aug 12, 2021Updated 4 years ago
- Brute Force instagram , The tool can Crack passwords, has 7 options for trying to hack an Instagram accountβ17Jan 23, 2025Updated last year
- MITMsmtp is an Evil SMTP Server for pentesting SMTP clients to catch login credentials and mails sent over plain or SSL encrypted connectβ¦β45Jan 28, 2024Updated 2 years ago
- Pipeleek scans CI/CD logs and artifacts to detect leaked secrets and pivot from themβ19Updated this week
- β14Mar 5, 2023Updated 2 years ago
- MacroPhantom automates the process of generating XOR+Caesar encrypted shellcode and embedding it into VBA macros for Microsoft Office docβ¦β18Mar 20, 2025Updated 11 months ago
- A PowerShell script designed to detect misconfigured Azure Storage Accounts that could potentially be exploited for privilege escalation β¦β13Apr 25, 2024Updated last year
- Session material from my conference presentation at Live360\Techmentor in Orlando,November 2023β11Nov 14, 2023Updated 2 years ago
- Windows library for hooking functions across processes, injecting DLLs into other applications, and more. (Somewhat similar to MS Detoursβ¦β12Apr 2, 2013Updated 12 years ago
- β12Feb 9, 2025Updated last year
- β14Jun 27, 2024Updated last year
- Notes For Hacking - PDF Collectionβ13Jul 31, 2024Updated last year
- vulnerable APIs inspired by https://github.com/mattvaldes/vulnerable-apiβ13Dec 8, 2021Updated 4 years ago
- An utility to download PDB files associated with a Portable Executable (PE).β15Feb 18, 2025Updated last year
- Proof of Concept for CVE-2025-24367β30Dec 8, 2025Updated 2 months ago
- Detecting cryptocurrency-related communications in network trafficβ12Apr 5, 2020Updated 5 years ago
- GiveWP PHP Object Injection exploitβ12Oct 1, 2024Updated last year
- The all-in-one hacking toolbox for hardware penetration testing.β18Jun 4, 2024Updated last year
- A tool for pairing Android 11 and newer devices for wireless debugging directly through a terminal using QR code.β11Feb 12, 2025Updated last year
- Go library to allow native inline hooking in windows at runtimeβ14Feb 7, 2024Updated 2 years ago
- Examples of self-modifying x86 linux assemblyβ11Dec 20, 2021Updated 4 years ago
- Trend Micro XDR/Vision One Hunting Recipiesβ18Apr 7, 2021Updated 4 years ago
- Abusing Remote Windows SMB Shares for Fun and Pen Testingβ15May 23, 2023Updated 2 years ago
- β12Sep 27, 2017Updated 8 years ago
- β14Mar 19, 2024Updated last year
- A collection of commands, tools, techniques and procedures of the purplestorm ctf team.β14Mar 20, 2025Updated 11 months ago
- SMTP Open Relay Exploitationβ16Nov 23, 2020Updated 5 years ago
- π΅οΈ Track down social media profiles using a specific username across multiple social network platformsβ63Dec 20, 2025Updated 2 months ago
- An AI-driven MCP server that autonomously interfaces with Malware Bazaar, delivering real-time threat intel and sample metadata for authoβ¦β26Nov 26, 2025Updated 3 months ago
- hacking-API-from-websiteβ13Sep 30, 2020Updated 5 years ago
- Excel Add In Payload Generatorβ14Oct 9, 2023Updated 2 years ago
- β14Aug 19, 2023Updated 2 years ago
- Collections of code obfuscation libaries for different languages ( in progress )β15Mar 18, 2023Updated 2 years ago
- Scan installed EDRs and AVs on Windowsβ605Dec 10, 2025Updated 2 months ago
- A Metamorphic virus πΊβ18Feb 1, 2022Updated 4 years ago
- Little java tool to decrypt passwords from Openfire embedded-dbβ16Nov 14, 2015Updated 10 years ago
- OpenCTI Documentation Spaceβ26Dec 18, 2025Updated 2 months ago