Contains aggregated lists and information on cybersecurity topics
☆39Mar 21, 2025Updated last year
Alternatives and similar repositories for cybersecurity
Users that are interested in cybersecurity are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆15Oct 6, 2024Updated last year
- Sysmon Config Pusher - Modernized☆38Jan 7, 2026Updated 3 months ago
- Open source cyber-serenity platform that help the security teams designing and managing companies' ISMS, and which allow them to create r…☆18Apr 3, 2026Updated last week
- Questions to ask about the team and company when you're interviewing for a CISO position☆15Oct 19, 2021Updated 4 years ago
- collection of materials and resources I use to teach computer security classes☆12Jun 25, 2021Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A curated awesome list of lists of interview questions. Feel free to contribute!☆22Jul 24, 2024Updated last year
- A PoC backdoor that uses Gmail as a C&C server☆13Jun 28, 2020Updated 5 years ago
- This program is designed to pull relevant current news articles for keywords defined in a keywords.csv file. GRC professionals can use th…☆33Jul 31, 2024Updated last year
- An index of publicly available and open-source threat detection rulesets.☆130Apr 17, 2025Updated 11 months ago
- ☆31Jan 11, 2023Updated 3 years ago
- OpenAPI Web Search: Revolutionizing the Way Developers find API Definitions 🚀☆26Apr 18, 2024Updated last year
- ☆32Updated this week
- Cheatsheet from the PJPT course of TCM security.☆34Jan 15, 2024Updated 2 years ago
- ☆41Jul 20, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Legal, procedural and policies document templates for operating MISP and information sharing communities☆38Jan 31, 2023Updated 3 years ago
- Simple python script to evade antiviruses on fully patched and updated Windows environments using a py2exe.☆20Oct 24, 2022Updated 3 years ago
- ☆10Feb 2, 2024Updated 2 years ago
- k8s ConfigMaps and Secrets Usage.☆11Jan 24, 2025Updated last year
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆152Apr 1, 2026Updated 2 weeks ago
- All my slides for any talks☆23Oct 13, 2024Updated last year
- Agentkube - Run Kubernetes Like Never Before☆37Mar 1, 2026Updated last month
- ☆11Mar 12, 2020Updated 6 years ago
- ☆37Dec 17, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆15May 22, 2023Updated 2 years ago
- 🗺 A map of OSINT tools.☆20Jul 5, 2023Updated 2 years ago
- NIST SP 800-53, Security and Privacy Controls for Federal Information Systems and Organizations☆41Feb 25, 2026Updated last month
- Beer-ISAC Community Resources☆26Jan 22, 2021Updated 5 years ago
- A collection of scripts designed to secure/harden Linux based distributions☆12Nov 2, 2025Updated 5 months ago
- Collection of all the resources published by Payatu.☆11Aug 11, 2025Updated 8 months ago
- List of resources for buiding a home lab☆311Aug 22, 2023Updated 2 years ago
- Detection of traffic lights and driving on red light.☆52May 25, 2014Updated 11 years ago
- ☆13May 30, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Picarch is a Python project for face detection and image similarity search using insightface and PostgreSQL.☆14Apr 8, 2025Updated last year
- TCM PEH Course AD Lab Build Script (Hydra-DC, Punisher-Workstation, Spiderman-Workstation)☆152Mar 20, 2024Updated 2 years ago
- Github page!☆12Sep 14, 2016Updated 9 years ago
- A web scrape of Darknetlive. Incognito Market admin has removed the news page. This scrape has everything including the news.☆31Dec 17, 2024Updated last year
- "Very simple but works well" Computer Vision based ID verification solution provided by LibraX.☆45Mar 23, 2021Updated 5 years ago
- Port Invaders is an arcade-style educational game designed to help you learn and memorize common networking port numbers. Whether you're …☆19Sep 4, 2023Updated 2 years ago
- V-USB Library based project - Send a string to your ATtiny85 via USB, press a button and have it typed back via HID Keyboard☆13Jan 6, 2019Updated 7 years ago