My collection of awesome resources, tools, and other shiny things for cyber security stuffs.
☆17Aug 31, 2018Updated 7 years ago
Alternatives and similar repositories for Hack-Infinity
Users that are interested in Hack-Infinity are comparing it to the libraries listed below
Sorting:
- Machine Learning Model to detect hidden malwares and phase changing malwares.It predicts the date of the next probable attack of the malw…☆13Apr 30, 2020Updated 5 years ago
- This project is based on detecting phishing/fraud/malicious website using Random Forest Classification formula. Implemented using Python …☆28Oct 2, 2020Updated 5 years ago
- Developed an Anomaly-based intrusion detection system using Multi Level Perceptron☆19Dec 13, 2020Updated 5 years ago
- A collection of Covid-19 related threat intelligence and resources.☆19Jul 17, 2020Updated 5 years ago
- https://github.com/xHak9x/fbi.git☆11Nov 17, 2019Updated 6 years ago
- BAT is a tool to help everyone to securing their web-servers.☆10Mar 29, 2021Updated 4 years ago
- Scripts I have written to perform various IT Security admin tasks. From validating findings to performing automated attacks☆20Mar 12, 2025Updated last year
- mini script para procurar oq precisa!☆11Feb 2, 2023Updated 3 years ago
- Secure destruction of sensitive virtual data, temporary files and swap partitions☆76Jan 16, 2023Updated 3 years ago
- Mobipack: CDR Data Analysis Package (HadoopEdition)☆13Jun 22, 2022Updated 3 years ago
- This is self study Python code for Penetration Testing(Plan to automotive V2X and IoT later)☆14Aug 4, 2020Updated 5 years ago
- Simple, reliable, persistent, undetectable Android reverse shell payload, compatible with Android 8, 9, 10, 11, 12 and 13☆12Dec 30, 2023Updated 2 years ago
- My Config Files☆10Jul 13, 2021Updated 4 years ago
- ☆17Feb 16, 2024Updated 2 years ago
- Machine Learning For Cybersecurity.☆70Nov 9, 2019Updated 6 years ago
- This project aims to create new tweets and carry out social engineering attacks by using the messages that people sent from social media …☆12Dec 16, 2017Updated 8 years ago
- Penetration Test Framwork☆21May 10, 2018Updated 7 years ago
- Automatically install all Kali linux tools☆27Jan 16, 2026Updated 2 months ago
- This keylogger takes the input of keyboard (Android) and mails it to the given mail.....☆11Oct 30, 2022Updated 3 years ago
- A comprehensive tool for categorizing TryHackMe rooms, including details such as difficulty, room type, subscription status, and much mor…☆26Dec 3, 2025Updated 3 months ago
- This is the reconnaissance script I wrote for my OSCP journey☆14Feb 20, 2018Updated 8 years ago
- Fast Pair BLE Spammer☆28Dec 23, 2023Updated 2 years ago
- TryHackMe walkthroughs and CTF writeups created for self-practice and to help others understand web exploitation, privilege escalation, a…☆46Mar 1, 2026Updated 2 weeks ago
- A fully undetected, hidden, persistent, reverse netcat shell backdoor for Windows.☆25Dec 4, 2020Updated 5 years ago
- ☆14Jul 11, 2021Updated 4 years ago
- DWM status bar.☆12Oct 4, 2018Updated 7 years ago
- The CyberSecurity Framework (CSF for short) is a local Python3 scripting package which aims directly on Cyber Security auditing, where yo…☆41Oct 28, 2017Updated 8 years ago
- IHULK (Improved Http Unbearable Load King) DoS Tool Ported to Python 3☆22Jan 16, 2017Updated 9 years ago
- Awesome Cyber-Security Data-sets Collection☆22Aug 30, 2018Updated 7 years ago
- Sistema de Reserva de Salas e Equipamentos (SiRe) do Instituto de Ciências Exatas e Aplicadas (ICEA) Campus João Monlevade da Universidad…☆24Mar 17, 2024Updated 2 years ago
- WikiLeaks Vault 7 CIA Hacking Tools☆27Sep 9, 2017Updated 8 years ago
- A few snippets to show how suricata stats can end up in Influx DB using logstash☆12Jul 11, 2016Updated 9 years ago
- a simpler version of the Doxbin with an open source backend made with Python and Flask.☆34Jul 9, 2022Updated 3 years ago
- Backup you mikrotik☆13Apr 29, 2020Updated 5 years ago
- Prototype system to monitor BGP routes and alert when anomalies are identified☆15Dec 7, 2018Updated 7 years ago
- A list to discover work of red team tooling and methodology for penetration testing and security assessment☆77Mar 8, 2019Updated 7 years ago
- Incident Response Collections☆11Jul 24, 2018Updated 7 years ago
- security course list☆14Sep 18, 2015Updated 10 years ago
- IPv4/IPv6 reverse lookup zone generator☆14Jun 6, 2022Updated 3 years ago