Kairos-T / CyberBitsView external linksLinks
[DEPRECATED] Cybersecurity blog (HTML, CSS, JS)
☆10Nov 25, 2023Updated 2 years ago
Alternatives and similar repositories for CyberBits
Users that are interested in CyberBits are comparing it to the libraries listed below
Sorting:
- A simple ATM interface (My first ever Python project!)☆11Jun 20, 2022Updated 3 years ago
- This (basic) AES and RSA file encryptor provides functions to encrypt and decrypt files using the AES and RSA cryptography algorithms. I…☆13Oct 8, 2023Updated 2 years ago
- This Python script uses the pyClamd library to scan a specified file for malware using ClamAV antivirus engine. If malware is detected, i…☆14Dec 28, 2023Updated 2 years ago
- A simple Python-based port scanner that allows you to scan open ports on a specified IPv4 address within a given port range. The scanner …☆12Aug 22, 2023Updated 2 years ago
- Sentiment Analysis Python script using NLP (NLTK's VADER model) tool that analyses text data and labels them with sentiment scores.☆15Apr 2, 2024Updated last year
- [IN THE WORKS] Python script designed to provide comprehensive analysis of malware samples, combining static and dynamic analysis techniq…☆22Jul 21, 2023Updated 2 years ago
- BB84 QKD simulation using the Python Qiskit library with various options: Simulation of a perfect implementation, low error rate, high er…☆13Feb 6, 2024Updated 2 years ago
- ☆16Feb 21, 2024Updated last year
- CTF wirte-ups☆14Oct 18, 2020Updated 5 years ago
- CTF Write-ups☆25Mar 13, 2017Updated 8 years ago
- Challenges and writeups for PatriotCTF 2023☆26Sep 11, 2023Updated 2 years ago
- xLEAPP - Merging of iLEAPP/RLEAPP/vLEAPP, ALEAPP, cLEAPP☆51Updated this week
- Foremost is a console program to recover files based on their headers, footers, and internal data structures. c.f., http://foremost.sourc…☆52Jan 10, 2013Updated 13 years ago
- Collection of CTF challenges I made☆53Jan 3, 2025Updated last year
- A community collection of security reviews of open source software components.☆96Feb 29, 2024Updated last year
- Native Python3 bindings for @horsicq's Detect-It-Easy☆80May 14, 2025Updated 9 months ago
- Write-ups for CTF challenges.☆17Oct 4, 2021Updated 4 years ago
- Zero-Width fingerprinting☆452Apr 16, 2018Updated 7 years ago
- Command and Control (C2) framework☆132May 16, 2025Updated 8 months ago
- Cybersecurity Notes☆168Apr 11, 2024Updated last year
- FirebaseExploiter is a vulnerability discovery tool that discovers Firebase Database which are open and can be exploitable. Primarily bui…☆175Nov 7, 2022Updated 3 years ago
- Unprotect is a collaborative platform dedicated to uncovering and documenting malware evasion techniques. We invite you to join us in thi…☆205Sep 20, 2025Updated 4 months ago
- Apple BLE proximity pairing message spoofing☆1,865Jun 17, 2024Updated last year
- The scripts helps security analsts to identify misconfigured firebase instances.☆232Aug 9, 2022Updated 3 years ago
- 🕵️ A curated list of awesome TraceLabs-endorsed OSINT tools☆279Dec 4, 2025Updated 2 months ago
- A collection of awesome networking courses, books, tutorials and other resources☆1,078Jan 16, 2026Updated 3 weeks ago
- A friendly browser-based tool for anonymizing photographs taken at protests☆992Feb 25, 2022Updated 3 years ago
- Awesome Incident Response☆284Sep 27, 2025Updated 4 months ago
- Call Tree Overviewer☆393Aug 15, 2025Updated 6 months ago
- A simple Python Exploit to Write Data to Insecure/vulnerable firebase databases! Commonly found inside Mobile Apps. If the owner of the a…☆326Jun 4, 2024Updated last year
- A (formerly) comprehensive guide to installing Coreboot on various laptops.☆290Jan 22, 2018Updated 8 years ago
- OWASP Mutillidae II is a free, open-source, deliberately vulnerable web application providing a target for web-security training. This is…☆1,468Aug 3, 2025Updated 6 months ago
- Yet another Stego Tool☆401Jul 3, 2023Updated 2 years ago
- USB Keystroke Injection Protection☆548Jul 9, 2023Updated 2 years ago
- Password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cra…☆616Feb 1, 2026Updated 2 weeks ago
- The hands-on NLTK tutorial for NLP in Python☆569Feb 4, 2026Updated last week
- CTF Cheat Sheet + Writeups / Files for some of the Cyber CTFs that I've done☆803Nov 18, 2025Updated 2 months ago
- The Best Practices for OSS Developers working group is dedicated to raising awareness and education of secure code best practices for ope…☆987Feb 6, 2026Updated last week
- Incident Response Documentation made easy. Developed by Incident Responders for Incident Responders☆960Oct 5, 2023Updated 2 years ago