JafarShamzsi / obsidian-cybersecurityView external linksLinks
☆28Jan 23, 2026Updated 3 weeks ago
Alternatives and similar repositories for obsidian-cybersecurity
Users that are interested in obsidian-cybersecurity are comparing it to the libraries listed below
Sorting:
- Decentralized uptime monitoring platform.☆12May 11, 2025Updated 9 months ago
- Writeup of what I'm learning with PentesterLab's Bootcamp☆10May 13, 2017Updated 8 years ago
- Ludus roles to deploy ASR rules and MDI auditing settings☆16Aug 5, 2025Updated 6 months ago
- ☆11Dec 22, 2022Updated 3 years ago
- ☆12Oct 9, 2022Updated 3 years ago
- CVE-2024-37081: Multiple Local Privilege Escalation in VMware vCenter Server☆10Jul 6, 2024Updated last year
- SpecOps is a Burp Suite extension that ingests an OpenAPI or Swagger spec and instantly builds a workbench to test every documented endpo…☆29Jan 18, 2026Updated 3 weeks ago
- Collection of red team scripts, resources & configs.☆15May 9, 2025Updated 9 months ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆13Nov 29, 2023Updated 2 years ago
- Webmin 1.910 - Remote Code Execution Using Python Script☆11Feb 6, 2024Updated 2 years ago
- ☆11Oct 3, 2019Updated 6 years ago
- Rust Weaponization for Red Team Engagements.☆12Nov 14, 2022Updated 3 years ago
- A Telegram bot for tracking and alerting major Solana token movements and whale activities using NestJS and Telegraf.☆14Oct 7, 2024Updated last year
- A shortlist of core ServiceNow tables.☆15Oct 16, 2023Updated 2 years ago
- Hunting Newly Registered Domains☆10Jan 6, 2019Updated 7 years ago
- A script to download OUI data from the IEEE and parse it into the nmap-mac-prefixes file so Nmap has the latest OUI data.☆12Jun 8, 2022Updated 3 years ago
- Alerts for Western Australian Covid-19 exposure locations via email, slack, and discord.☆11Mar 29, 2022Updated 3 years ago
- tool for sniffing images over HTTP traffic and showing them on the console. Designed for remote shells.☆12Jul 30, 2020Updated 5 years ago
- Simple Syslog Generator☆11Jun 15, 2024Updated last year
- An assessment tool to interact with Velocio PLCs☆13Sep 24, 2021Updated 4 years ago
- Defending OT with ATT&CK provides a customized threat collection tailored to the attack surface and threat model of operational technolog…☆13May 28, 2025Updated 8 months ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆11Apr 16, 2022Updated 3 years ago
- Open source Windows Event Collector☆10Jun 15, 2024Updated last year
- Evaluation of packer type estimation/detection tools☆14Mar 24, 2021Updated 4 years ago
- Generate your own (fake) Sun Tzu quote images!☆15May 4, 2021Updated 4 years ago
- ☆12Apr 14, 2021Updated 4 years ago
- The Syncthing website☆16Dec 1, 2025Updated 2 months ago
- An ansible playbook that sets up a tricked-out zsh & vim environment☆25Jun 21, 2013Updated 12 years ago
- Web-based GUI for TorBox☆19Jun 13, 2023Updated 2 years ago
- A simple CLI tool to check WebDAV vulnerability☆14Aug 13, 2021Updated 4 years ago
- Create and publish PiRogue images☆23May 3, 2025Updated 9 months ago
- Magical Bulk Whois (No CAPTCHA!) 🪄🪄🪄🪄🪄🚀🚀🚀🚀🚀☆15Jun 23, 2023Updated 2 years ago
- Trade your opinions☆18Nov 17, 2024Updated last year
- A blog describing general hardware and software reverse engineering.☆18Jan 5, 2024Updated 2 years ago
- Red Insight is a comprehensive repository dedicated to documenting penetration testing techniques, tools, and findings. It serves as a re…☆19Sep 16, 2024Updated last year
- Red Team Server (RTS)☆16Mar 8, 2024Updated last year
- A simple config tool to make locally trusted X.509 development certificates for your domains☆22Sep 10, 2024Updated last year
- ☆20Sep 27, 2023Updated 2 years ago
- the assembly shell and backdoor Trojan☆18Dec 19, 2021Updated 4 years ago