☆14Aug 16, 2021Updated 4 years ago
Alternatives and similar repositories for Cyber-Security-Contents
Users that are interested in Cyber-Security-Contents are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆28Aug 12, 2021Updated 4 years ago
- The OWASP Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and…☆10Oct 12, 2019Updated 6 years ago
- ☆11May 30, 2021Updated 4 years ago
- ☆17Sep 2, 2021Updated 4 years ago
- ☆33Aug 25, 2021Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆20May 18, 2022Updated 3 years ago
- ☆24Oct 12, 2021Updated 4 years ago
- Repository to put my notes related to OSCP certification☆20Aug 29, 2019Updated 6 years ago
- ☆76Aug 19, 2021Updated 4 years ago
- ☆45Oct 19, 2021Updated 4 years ago
- ☆17Jul 19, 2021Updated 4 years ago
- ☆27Mar 25, 2021Updated 5 years ago
- ☆19Mar 13, 2022Updated 4 years ago
- ☆103Aug 31, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆18Jun 16, 2021Updated 4 years ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆16Aug 16, 2022Updated 3 years ago
- ☆13Nov 22, 2022Updated 3 years ago
- ☆74Jan 2, 2025Updated last year
- eLearnSecurity Certified Exploit Development☆105Jul 25, 2021Updated 4 years ago
- C2Matrix Automation☆15Sep 10, 2023Updated 2 years ago
- Automatic cloud backup of Kali Linux data☆13Feb 27, 2020Updated 6 years ago
- A tool that automates the trevorc2 powershell agent obfuscation process with the pyfuscation tool☆14Jun 28, 2023Updated 2 years ago
- King of Bug Bounty Tips Simple Tool☆13Oct 2, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆159Sep 20, 2021Updated 4 years ago
- Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152☆23Jan 1, 2023Updated 3 years ago
- ☆13Nov 4, 2019Updated 6 years ago
- ☆112May 30, 2021Updated 4 years ago
- ☆212Mar 4, 2022Updated 4 years ago
- Automated DevOps is a repo that integrates Red Hat Linux 8, CentOS Stream and Oracle Linux 8 Packer templates for a vSphere & ESXi enterp…☆17Nov 26, 2025Updated 5 months ago
- Practice Labs☆104Dec 10, 2020Updated 5 years ago
- A simple C program to demonstrate a Buffer Overflow.☆12Jul 31, 2021Updated 4 years ago
- ☆65Jun 5, 2021Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Fuxsociety Mr Robot 2.1☆28May 15, 2023Updated 2 years ago
- Hackthebox, Vulnhub, TryHackMe and Real World PenTest☆126Sep 8, 2020Updated 5 years ago
- Reports from various areas of information security☆272Apr 13, 2024Updated 2 years ago
- Here are some common interview questions for an application security position you can review for your own interview, along with example a…☆31Apr 17, 2022Updated 4 years ago
- Misc stuff from internet☆12Apr 13, 2026Updated 3 weeks ago
- A lightweight Python tool to analyze PCAP files and generate network traffic reports. It detects traffic patterns, security concerns, and…☆18Sep 25, 2024Updated last year
- ☆87Sep 27, 2022Updated 3 years ago