Projects related to Information security/Cyber security/Cryptography
☆29Dec 15, 2023Updated 2 years ago
Alternatives and similar repositories for Information-Security
Users that are interested in Information-Security are comparing it to the libraries listed below
Sorting:
- A Repo to keep the CyberSecurity-IIITA projects☆16Aug 9, 2017Updated 8 years ago
- THIS MODULE HAS BEEN DEPRECATED. See the README.md for more information.☆18Sep 30, 2020Updated 5 years ago
- This is an intensive 24-week long boot camp program. Skills learned consist of Wireshark, Kali Linux, Metasploit, Burp Suite, Elk Stack, …☆19Apr 5, 2023Updated 2 years ago
- Toolkit of Python scripts for web security, network recon, login brute-forcing, and ARP spoofing experiments. Designed strictly for learn…☆29Nov 28, 2025Updated 3 months ago
- Cryptocurrencies related Security resources☆14May 24, 2023Updated 2 years ago
- UglyEXe - bypass some AVs☆17Feb 28, 2020Updated 6 years ago
- A collection of tutorials, CTFs, wargames, articles, and other resources for Smart Contract security.☆14Jun 4, 2022Updated 3 years ago
- HOCXSS (Cross Site Scripting)☆12May 7, 2020Updated 5 years ago
- Quick Repo for any Bug Hunter☆15May 19, 2021Updated 4 years ago
- Resume Builder using Java and JDBC☆33Jun 8, 2020Updated 5 years ago
- pen testing scripts☆12Feb 7, 2021Updated 5 years ago
- List of resources about CyberSecurity such as CTF, DFIR, Offsec, etc☆11Dec 29, 2025Updated 2 months ago
- stream-of-consciousness experience of an AI's thinking process, complete with creative tangents and unexpected connections.☆14Jan 29, 2025Updated last year
- get birth date of your friend from ERP☆12May 10, 2019Updated 6 years ago
- CyberSecurity Resources (Threat Intelligence, Malware Analysis, Pentesting, DFIR, etc)☆11Nov 30, 2023Updated 2 years ago
- Context-carrying logger with conditional methods.☆13Apr 17, 2025Updated 11 months ago
- ☆18Nov 24, 2020Updated 5 years ago
- ☆13Oct 16, 2025Updated 5 months ago
- These are some of the basic network topologies I configured when preparing for the CCNA R&S 200-125 exam.☆22Sep 2, 2020Updated 5 years ago
- A collection of Metasploit plugins I have written for various reasons.☆15Dec 5, 2020Updated 5 years ago
- Groq + Google☆11Apr 27, 2024Updated last year
- A shell for your agent☆17Dec 7, 2025Updated 3 months ago
- A serverless invite-only AI-powered chat bot on Telegram.☆10Updated this week
- Generates permutations, alterations and mutations of subdomains. Auto Resolve what we find.☆11Dec 8, 2020Updated 5 years ago
- Useful cyber security and digital forensics resources☆17Oct 20, 2020Updated 5 years ago
- Resources for DFIR. And more.☆11Jul 3, 2024Updated last year
- Replicache examples integrating with various frontend frameworks☆15Mar 25, 2023Updated 2 years ago
- Collection of free resoures for interview preparation & professional growth☆14Jan 6, 2021Updated 5 years ago
- ☆14May 30, 2022Updated 3 years ago
- Hash Generator & Cracker☆38Mar 24, 2020Updated 5 years ago
- Desktop application that allow you to make a live chat.☆45May 30, 2019Updated 6 years ago
- My portfolio website made with React and Sass☆17Sep 5, 2024Updated last year
- Bug Bounty tool to automate the recon process.☆12Oct 4, 2023Updated 2 years ago
- ☆15Oct 31, 2023Updated 2 years ago
- a nodeschool workshop for munging data on the command line☆36Aug 20, 2015Updated 10 years ago
- Chrome/Firefox extension to help you write gud anywhere there's a text field in your browser via an LLM☆11Feb 2, 2025Updated last year
- This repo hosts multiple codes, content, checklists etc which can help a penetration tester in a web application auditing.☆21Sep 14, 2023Updated 2 years ago
- ☆22Feb 10, 2026Updated last month
- Utility to pull disclosed vulnerabilities from HackerOne private programs - for personal use only☆13Aug 22, 2021Updated 4 years ago