JafarShamzsi / obsidian-cybersecurityLinks
☆28Updated last week
Alternatives and similar repositories for obsidian-cybersecurity
Users that are interested in obsidian-cybersecurity are comparing it to the libraries listed below
Sorting:
- Learn how to submit your first PR.☆20Updated last year
- A DICOM honeypot for detecting and logging unauthorized access attempts☆47Updated 2 weeks ago
- the place to learn machine learning☆69Updated 3 months ago
- Tools and resources to help you build, design, and win hackathons! 🏆☆61Updated 2 months ago
- The Kill-The-Code Python Program provides a robust mechanism for remotely controlling code execution by monitoring a specified URL for a …☆18Updated last year
- HTTP/S Service Monitor Script This Bash script periodically monitors the availability and content of web services (HTTP/HTTPS) specified…☆15Updated 4 months ago
- This repository serves as a curated resource for OffSec's OSEP (PEN-300) certification preparation, containing useful links, materials, a…☆65Updated last year
- This project demonstrates SPF-bypass techniques utilised by phishers to abuse domains that haven't been secured by DMARC.☆58Updated 3 years ago
- Appollo is an open-source tool for continuous attack surface monitoring, helping organizations identify, analyze, and mitigate security r…☆44Updated 3 weeks ago
- SLAM - Simple Local Area Monitor is a lightweight tool for continuous local network monitoring and device discovery.☆18Updated 6 months ago
- OWASP BLT - Bug Logging Tools☆276Updated this week
- ☆57Updated 3 months ago
- The biggest collection of cybersecurity resources☆18Updated last year
- ☆20Updated last month
- Damn Vulnerable Browser Extension (DVBE), previously named as Badly Coded Browser Extension (BCBE), is an open-source vulnerable Chrome E…☆31Updated 10 months ago
- All the code snippets from my Secure Code Review series on youtube (youtube.com/@muqsitbaig)!☆25Updated last year
- ☆47Updated 10 months ago
- Pentester plugin for Oh-My-Zsh. Boosting efficiency & and saving time with common initial tasks for pentesting☆17Updated last year
- Materials from the previous MCC trainers☆18Updated 2 weeks ago
- Modular framework for automating triaging, malware analysis, and analyst workflows☆44Updated 8 months ago
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆25Updated last year
- A tech enumeration toolkit focused on 404 Not found pages.☆25Updated last year
- Gixposed is a powerful command-line tool designed to search the commit history of Git repositories for sensitive information, such as API…☆37Updated last year
- Social Engineering Tactics contains real-world social engineering tactics used for manipulation, persuasion, and deception. Stay aware an…☆45Updated last week
- ☆28Updated last year
- keep watching new bug bounty (vulnerability) postings.☆13Updated last year
- Hacking: The Art of Exploitation 2nd Edition, by Jon Erickson☆21Updated 5 years ago
- 📙 User documentation for Caido☆37Updated last week
- PyIntruder: A Python fuzzer boasting multithreading for accelerated performance, a user-friendly tkinter GUI interface, and a wide array …☆56Updated 4 years ago
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆82Updated last year