Personal blog about cyber security and challenges
☆20Mar 17, 2026Updated this week
Alternatives and similar repositories for Cyber-Security-Blog
Users that are interested in Cyber-Security-Blog are comparing it to the libraries listed below
Sorting:
- A python network scanner using scapy☆25Mar 21, 2020Updated 6 years ago
- Open Penetration Testing Bookmarks Collection☆19Jun 9, 2015Updated 10 years ago
- Free to use editor to create online resume☆17Nov 10, 2023Updated 2 years ago
- Install popular tools used while pentesting & playing labs☆14Oct 8, 2021Updated 4 years ago
- The wordlists that have been compiled using disclosed reports at HackerOne bug bounty platform☆25Jun 28, 2020Updated 5 years ago
- Subscan is a simple tool for subdomain scanner, it can scan subdomains fast.☆39Aug 9, 2023Updated 2 years ago
- Simple OBS whiteboard/telestrator plugin☆14Aug 1, 2025Updated 7 months ago
- This tool serves to add the kali linux repository to the ubuntu repository instantly. So that ubuntu users can install some of the tools …☆19Apr 16, 2022Updated 3 years ago
- Easy way to automate the complex task☆15Jul 15, 2022Updated 3 years ago
- ☆15Dec 10, 2022Updated 3 years ago
- Find random, interesting content from Reddit and Hacker News with just one click.☆13Sep 8, 2024Updated last year
- How to include one HTML file with CSS as well as Javascript defined in it into another HTML file without any framework or library☆11Dec 18, 2021Updated 4 years ago
- Pre-commit, pre-push, rust-centric☆20Mar 5, 2026Updated 2 weeks ago
- A curated collection of courses, videos, and resources to master network security from the ground up.☆10Jan 6, 2025Updated last year
- Script to automate, when possible, the passive reconnaissance performed on a website prior to an assessment.☆38Mar 5, 2026Updated 2 weeks ago
- A tool for patching/injecting code into elf binaries.☆14Sep 27, 2012Updated 13 years ago
- ☆12Jul 31, 2024Updated last year
- PHP Vulnerability Hunter (fork)☆13May 8, 2015Updated 10 years ago
- Source code for 'Software Exorcism' by Bill Blunden☆13Mar 30, 2017Updated 8 years ago
- android kernel on amlogic chip☆13Dec 22, 2012Updated 13 years ago
- Test domain expiration dates.☆12Dec 2, 2022Updated 3 years ago
- A Python native library containing lots of useful functions to write efficient scripts to hack stuff.☆42Nov 10, 2025Updated 4 months ago
- Spacehuhn Wiki Source☆13Apr 27, 2023Updated 2 years ago
- A collection of awesome penetration testing resources, tools and other shiny things☆13May 18, 2018Updated 7 years ago
- A tool to BruteForce ssh. An upgraded version of Hydra. Multiple bruteforce options☆11Jul 9, 2022Updated 3 years ago
- Bulk indicator VirusTotal lookups supporting file hashes, domains and IPs.☆13May 28, 2025Updated 9 months ago
- A wrapper for the TextBelt API that allows messages to be sent with delays from the command line.☆16May 19, 2015Updated 10 years ago
- For Interview, OSCP proof of concept code during the course.☆16Jul 26, 2019Updated 6 years ago
- A free to use minimal portfolio template☆12Aug 15, 2025Updated 7 months ago
- A web app scanner☆24Jan 23, 2014Updated 12 years ago
- Simplified version of flashrom for installing new system firmware☆23Mar 10, 2023Updated 3 years ago
- Dukaan Payout Assignment by Subhash☆10Sep 23, 2023Updated 2 years ago
- List of sources for cybersecurity news☆41Dec 16, 2022Updated 3 years ago
- ☆18Oct 12, 2021Updated 4 years ago
- Urho3D extra minimal examples and demos. Tested in Ubuntu 18.04.☆11Feb 25, 2022Updated 4 years ago
- A repository with UEFI research stuff☆16Jun 23, 2023Updated 2 years ago
- Basics on commands/tools/info on how to assess the security of mobile applications☆15Apr 27, 2023Updated 2 years ago
- Web Hacking Tools☆15Feb 26, 2022Updated 4 years ago
- Load your data into burp☆11Apr 26, 2023Updated 2 years ago