The repository is a valuable resource for individuals looking to enhance their knowledge and skills in cybersecurity. It provides in-depth materials and guides for various cybersecurity domains.
☆122Feb 8, 2026Updated last month
Alternatives and similar repositories for CRLJ
Users that are interested in CRLJ are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A curated awesome list of lists of interview questions. Feel free to contribute!☆22Jul 24, 2024Updated last year
- This repo contains Machines and Notes for practicing for EJPTv2 & CJCA exams☆154Jan 9, 2026Updated 2 months ago
- A diverse collection of privacy, security, and FOSS resources in English and Arabic, encompassing tools, extensions, operating systems, e…☆37Jun 12, 2025Updated 9 months ago
- Scripts for solving WebSecurity Academy labs of PortSwigger using Python☆99Aug 28, 2025Updated 7 months ago
- Collection of Jupyter Notebook for Threat Hunting and Blue Team Purposes☆22Jun 15, 2022Updated 3 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- a recon framework that facilitates discovering, scanning and monitoring assets trough a configurable engine running on serverless aws inf…☆12Aug 26, 2024Updated last year
- This repo shares blue team security notes and resources for detecting and preventing cyber attacks. Topics covered include email, file, l…☆52Apr 5, 2025Updated 11 months ago
- Welcome Hackers, this is your go-to resource for learning cybersecurity stuff everyday :)☆44Updated this week
- Personal pentest notes and playbooks<3☆33Jan 7, 2026Updated 2 months ago
- ☆14Sep 28, 2023Updated 2 years ago
- Comprehensive roadmaps for studying Logic from Aristotle to contemporary research☆17Jul 10, 2025Updated 8 months ago
- ☆223Feb 29, 2024Updated 2 years ago
- The Repository contains various payloads, tools, tips and tricks from various hackers around the world. Please take a quick look down her…☆15May 15, 2025Updated 10 months ago
- ☆11Jan 21, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆81Aug 24, 2023Updated 2 years ago
- AutoAR is an automated security reconnaissance tool and Discord bot for bug bounty hunters and penetration testers. It automates gatherin…☆58Mar 21, 2026Updated last week
- Dockerfile with advanced configurations for Offensive Docker.☆13Sep 18, 2020Updated 5 years ago
- PoC☆12Apr 7, 2025Updated 11 months ago
- ☆14Aug 22, 2025Updated 7 months ago
- Creating a Bind Shell in C☆20Aug 21, 2023Updated 2 years ago
- ☆15Apr 10, 2025Updated 11 months ago
- Yet Another Mac Changer!!!☆12Jan 26, 2023Updated 3 years ago
- ☆117May 31, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A web server designed to shut off on command to exploit DNS rebinding in Chromium-based browsers☆19Jun 9, 2023Updated 2 years ago
- ☆21Dec 8, 2022Updated 3 years ago
- Cybersecurity Resources☆322May 25, 2025Updated 10 months ago
- Using a Google a Programmable Search Engine to make custom Digital Business Card Search Engine☆10Oct 4, 2022Updated 3 years ago
- ☆15Jul 22, 2022Updated 3 years ago
- ☆13Jun 26, 2022Updated 3 years ago
- Your bloodhound for hidden info in those JS files.☆17May 13, 2024Updated last year
- Decentralized Device Orchestration Framework inspired by Mirai Architecture☆38Jan 24, 2026Updated 2 months ago
- apkfram was written in order to help any mobile penetration testers to identify the Framework used to develop the Android application.☆12Oct 9, 2024Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆18Feb 9, 2024Updated 2 years ago
- Wi-Fi Deauther is a command-line utility for educational purposes, enabling users to perform Wi-Fi network actions such as scanning, deau…☆57Nov 2, 2023Updated 2 years ago
- just a small project for courses btw☆10Feb 2, 2025Updated last year
- ☆22Feb 3, 2026Updated last month
- hotmail inbox checker written python with imap protocol☆13Nov 20, 2025Updated 4 months ago
- Automated GitHub secret scanning with smart alerting & monitoring.☆30Jan 15, 2026Updated 2 months ago
- ☆68May 3, 2024Updated last year