Enterprise Networking Projects / Cisco Packet Tracer Projects (Project #6)
☆47Apr 7, 2025Updated 10 months ago
Alternatives and similar repositories for Company-Business-System-Network-Design
Users that are interested in Company-Business-System-Network-Design are comparing it to the libraries listed below
Sorting:
- A Simple RedLineStealer☆13Aug 30, 2023Updated 2 years ago
- Cybersecurity Cloud Homelab☆18Sep 28, 2023Updated 2 years ago
- A suite of WiFi/Bluetooth offensive and defensive tools for the ESP32 and ESP8266☆198Mar 24, 2021Updated 4 years ago
- Pen Test Report Generation and Assessment Collaboration☆591Updated this week
- Content discovery wordlists generated using BigQuery☆581Apr 26, 2020Updated 5 years ago
- ☆626Feb 1, 2024Updated 2 years ago
- Personalize your Termux startup with custom logos, titles, ZSH themes, and keyboard layouts — all from a slick interactive menu.☆739Dec 11, 2025Updated 2 months ago
- OWASP CRS (Official Repository)☆3,004Updated this week
- 80+ DevOps & Data CLI Tools - AWS, GCP, GCF Python Cloud Functions, Log Anonymizer, Spark, Hadoop, HBase, Hive, Impala, Linux, Docker, Sp…☆814Feb 3, 2026Updated last month
- A collection of sources of indicators of compromise.☆953May 8, 2025Updated 9 months ago
- HostHunter a recon tool for discovering hostnames using OSINT techniques.☆1,156Mar 30, 2023Updated 2 years ago
- You didn't think I'd go and leave the blue team out, right?☆1,734Jan 5, 2026Updated 2 months ago
- This is my entire homelab documentation files. Here you'll find notes, setups, and configurations for infrastructure, applications, netwo…☆2,018Nov 4, 2024Updated last year
- This repository will contain many mindmaps for cyber security technologies, methodologies, courses, and certifications in a tree structur…☆8,664Jun 22, 2025Updated 8 months ago
- Cyber Security Tool For Hacking Wireless Connections Using Built-In Kali Tools. Supports All Securities (WEP, WPS, WPA, WPA2/TKIP/IES)☆2,445Jan 4, 2026Updated 2 months ago
- Whoami provides enhanced privacy, anonymity for Debian and Arch based linux distributions☆2,269Oct 13, 2025Updated 4 months ago
- Projects to get you started on full stack☆2,436Dec 25, 2023Updated 2 years ago
- Infect Any Android Device With Virus From Link In Termux☆2,804Aug 27, 2025Updated 6 months ago
- Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.☆2,699Apr 20, 2024Updated last year
- Code library for competitive programming purposes.☆2,476Jul 2, 2022Updated 3 years ago
- Generate a timeline of your day, automatically☆5,809Updated this week
- I created this repository to keep my learning, notes, and code in one place for various tools in DevOps. Now, it's helping thousands of l…☆3,144Dec 13, 2025Updated 2 months ago
- A simple Flutter app to Read and Download eBooks.☆3,314Aug 7, 2024Updated last year
- Optimized and Maintenance-free Kubernetes on Hetzner Cloud in one command!☆3,719Feb 20, 2026Updated last week
- A curated list of awesome social engineering resources.☆3,880Apr 5, 2023Updated 2 years ago
- GenAI Cookbook☆4,218Feb 26, 2026Updated last week
- A Simple android remote administration tool using sockets. It uses java on the client side and python on the server side☆4,619Jul 17, 2024Updated last year
- Social engineering tool [Access Webcam & Microphone & Location Finder] With {Py,JS,PHP}☆4,832Oct 12, 2024Updated last year
- All the deals for InfoSec related software/tools this Black Friday☆4,343Nov 28, 2025Updated 3 months ago
- This is my personal knowledge-base. Here you'll find code-snippets, technical documentation, and command reference for various tools, and…☆4,710Feb 12, 2025Updated last year
- Open source hyperconverged infrastructure (HCI) software☆4,936Updated this week
- This repository contains best profile readme's for your reference.☆5,170May 7, 2025Updated 9 months ago
- An all-in-one hacking tool to remotely exploit Android devices using ADB and Metasploit-Framework to get a Meterpreter session.☆5,653Apr 19, 2024Updated last year
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.☆6,082Aug 14, 2024Updated last year
- Cowrie SSH/Telnet Honeypot https://docs.cowrie.org/☆6,211Updated this week
- A curated list of GPT agents for cybersecurity☆6,454Jul 21, 2024Updated last year
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆6,353Jan 26, 2026Updated last month
- This is my personal template collection. Here you'll find templates, and configurations for various tools, and technologies.☆7,470Updated this week
- 🪐 Markdown with superpowers: from ideas to papers, presentations, websites, books, and knowledge bases.☆10,212Updated this week