DhanushNehru / Ultimate-Cybersecurity-Resources
A collection of cybersecurity resources
☆13Updated 2 weeks ago
Alternatives and similar repositories for Ultimate-Cybersecurity-Resources:
Users that are interested in Ultimate-Cybersecurity-Resources are comparing it to the libraries listed below
- Project build for joel and joshua students from Germany | course: Advanced Tactics in information security☆19Updated 3 months ago
- NetFuzzer is a comprehensive network security assessment tool for internal and external network components, including Host Machines, Fire…☆14Updated 2 months ago
- ☆10Updated 4 months ago
- The Kill-The-Code Python Program provides a robust mechanism for remotely controlling code execution by monitoring a specified URL for a …☆16Updated 8 months ago
- Enumeration & fingerprint tool☆24Updated last year
- Python-based web scraper for a darkweb marketplace on the Tor network.☆30Updated 7 months ago
- An Exploitation script developed to exploit the CVE-2023-4966 bleed citrix information disclosure vulnerability☆9Updated last year
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environments☆13Updated last year
- This tool is used for web penetration testing features like subnet scanning, directory enumeration, port scanning and more☆12Updated 2 years ago
- Web Recon Tool 🔍 An efficient reconnaissance tool for security researchers, ethical hackers, and developers to gather vital information …☆21Updated 5 months ago
- Install an arsenal of OSINT tools by running IntelBox on your Debian VM or OS☆13Updated 2 years ago
- ☆14Updated 2 years ago
- Nuclei template for CVE-2024-23897 (Jenkins LFI Vulnerability)☆18Updated last year
- Single-Clich-Proxy-Chains☆9Updated 4 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- OSINT tool for username, email and domains☆28Updated 11 months ago
- ☆12Updated last year
- This project provides a set of Google Apps Scripts designed to help you identify and analyze potentially malicious domains directly from …☆12Updated 7 months ago
- ☆13Updated last month
- Hack Windows with FUD backdoor/payload, Escalates LINUX privileges, Devastate Linux, Tunnel forwarding☆15Updated 4 years ago
- This tool will resolve a list of Domains, IPs, Hosts, URLs and save the results for valid/invalid fast!☆15Updated 2 years ago
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆32Updated 2 years ago
- Programs I Made while learning python for pentesters.☆18Updated 2 years ago
- Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152☆19Updated 2 years ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7Updated 3 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Updated 3 years ago
- The first and only (for now) Bulgarian OSINT tools list.☆19Updated last year
- Priv8 Tools Software Mass Dork Auto Exploit.☆13Updated 2 years ago
- Strumenti per Domini - Whois - IP - Data Breach - Email☆16Updated 5 months ago
- a drop-in replacement for Nmap powered by shodan.io☆10Updated 3 years ago