☆18Apr 9, 2024Updated last year
Alternatives and similar repositories for InformationSecurityMethodsAndTools
Users that are interested in InformationSecurityMethodsAndTools are comparing it to the libraries listed below
Sorting:
- ☆29Aug 12, 2021Updated 4 years ago
- Bruteratel☆13Oct 26, 2022Updated 3 years ago
- dockerfile of Acunetix Web Vulnerability Scanner14(210615184)☆14Jun 24, 2021Updated 4 years ago
- Training and certifications related to secure software development☆11Feb 9, 2026Updated 3 weeks ago
- Wazuh - Virtual Machines (OVA and AMI)☆16Updated this week
- Kaspersky Security Center: custom decoders and rules for Wazuh SIEM☆18Aug 16, 2024Updated last year
- 2 factor authentification using SMS (over gsm modem or payed sms gateway) / Synology Chat / Telegram bot when users or any equipment crea…☆12Sep 21, 2020Updated 5 years ago
- Fast tool to lookup list of IP adresses☆14Oct 5, 2022Updated 3 years ago
- ☆10Sep 11, 2023Updated 2 years ago
- Automate Burp Suite Professional setup on macOS with multi-version support, JDK 21, built-in keygen, and instant launcher for pentesters …☆21Sep 27, 2025Updated 5 months ago
- TeaVin - Ultimate ESP32 EvilTwin☆13Mar 25, 2024Updated last year
- ☆11Jul 13, 2022Updated 3 years ago
- simple shellcode injector for Windows / Process Hollowing☆15Jun 26, 2024Updated last year
- 2048 written in x64 assembly for educational purposes (OS: Windows)☆17Oct 19, 2021Updated 4 years ago
- Using a Telegram Chat to Act as a Command and Control Server with Powershell for Windows☆20Jun 25, 2024Updated last year
- A powerful macOS triage collection tool designed for forensic analysis. It gathers critical system artifacts such as FSEvents, Spotlight,…☆35Oct 24, 2025Updated 4 months ago
- A free data collection and YARA scanning tool for cybersecurity incident investigation, compromise assessment and threat hunting☆20Nov 12, 2024Updated last year
- ☆16Nov 27, 2023Updated 2 years ago
- Zeromutarts Capture the Flag 2013 challenge writeups☆22Dec 9, 2013Updated 12 years ago
- Cobalt Strike Wrapper☆20Aug 13, 2025Updated 6 months ago
- Explore effective penetration testing techniques with Metasploit☆17Jan 30, 2023Updated 3 years ago
- Free firewall for windows☆17Nov 5, 2008Updated 17 years ago
- Ru-WireGuard reference implementation: WireGuard protocol with GOST crypto algorithms☆16Dec 22, 2020Updated 5 years ago
- Automation tool designed to simplify the analysis of PCAP (Packet Capture) files☆18Mar 15, 2024Updated last year
- This module exploits a vulnerability in WinRAR (CVE-2023-38831). When a user opens a crafted RAR file and its embedded document, a script…☆15Sep 8, 2023Updated 2 years ago
- Bring runZero Exposure Management into BloodHound☆44Nov 19, 2025Updated 3 months ago
- Fast password finder in MS office files (doc, xls) and other files (rtf, txt, xml) in folders☆19Feb 2, 2026Updated last month
- ☆20Oct 17, 2021Updated 4 years ago
- Python3 HTTP Server with upload functionality☆20Dec 4, 2023Updated 2 years ago
- Extracting Clear Text Passwords from mstsc.exe using API Hooking.☆18Nov 17, 2019Updated 6 years ago
- Репозиторий содержит список вопросов по наступальной безопасности.☆359Oct 26, 2025Updated 4 months ago
- Provides a simple but highly configurable browser for use on Kiosk devices☆19Dec 1, 2023Updated 2 years ago
- ☆20Sep 6, 2023Updated 2 years ago
- Web-based sensor management suite☆20Mar 2, 2023Updated 3 years ago
- My POC implementation of HVNC (Hidden VNC / Hidden Desktop)☆28Dec 30, 2024Updated last year
- Stack integrity verification to Detect SleepMask or CallStack Spoofer☆53Jul 13, 2025Updated 7 months ago
- ownCloud exploits for CVE-2023-49105☆37Dec 5, 2023Updated 2 years ago
- HTTPSniffer LSP proider☆27Dec 10, 2012Updated 13 years ago
- M5Stack ESP32 Packet Monitor☆27Mar 13, 2020Updated 5 years ago