MrM8BRH / CyberSecurity_ConferencesView external linksLinks
List of some cybersecurity conferences
☆59Feb 8, 2026Updated last week
Alternatives and similar repositories for CyberSecurity_Conferences
Users that are interested in CyberSecurity_Conferences are comparing it to the libraries listed below
Sorting:
- This is a working variant of the Mirai IOT botnet☆15Nov 22, 2022Updated 3 years ago
- Threat Intel and Incident Reponse☆10Aug 29, 2018Updated 7 years ago
- A modified version of TomNomNom's anew, allowing for multiple files to be defined as parameters.☆13Jun 17, 2023Updated 2 years ago
- Simple 5060 port exploit that calls to a receiver device with pre-setuped phrase☆34Jul 5, 2022Updated 3 years ago
- A repo for UVa's CS 4630, Defense Against the Dark Arts course☆18Dec 5, 2017Updated 8 years ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆77Nov 12, 2023Updated 2 years ago
- ☆20Dec 29, 2024Updated last year
- Central IoC scanner based on Loki☆20Nov 12, 2021Updated 4 years ago
- Ded Security Framework is a tool aimed at security professionals☆35May 12, 2024Updated last year
- A collection of red blue team staff☆48Jun 1, 2023Updated 2 years ago
- Kernel Mode Driver for Elevating Process Privileges☆134Mar 23, 2023Updated 2 years ago
- PassMute - A multi featured Password Transmutation/Mutator Tool☆54Jun 18, 2023Updated 2 years ago
- Apply Machine Learning and Game Theory to improve the security of the Turris network of CZ.NIC☆24Sep 24, 2019Updated 6 years ago
- Script to test NetSec capabilities.☆21May 1, 2023Updated 2 years ago
- A curated malware database with more then +73000 samples.☆19Feb 20, 2021Updated 4 years ago
- APK Infrastructure Investigator☆64Jun 20, 2023Updated 2 years ago
- ☆22Oct 7, 2022Updated 3 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Jul 31, 2020Updated 5 years ago
- A Python based backdoor that uses Steganography and a Cloud Image Service as a command and control server.☆26Sep 2, 2016Updated 9 years ago
- Phishing can't get any easier with Tilapia☆11Jan 2, 2023Updated 3 years ago
- Core A2P2V functionality (command line based)☆68May 14, 2024Updated last year
- Capture screenshots of onion services on an onion service.☆73Jun 11, 2024Updated last year
- Playground for Race Condition attack☆24Mar 18, 2023Updated 2 years ago
- CyCAT.org API back-end server including crawlers☆29Feb 4, 2023Updated 3 years ago
- Generate JSON force-directed/ node graph data from MITRE's ATTACK framework and visualize it interactively☆38Apr 19, 2025Updated 9 months ago
- Advanced Cyber Threat Map (Simplified, customizable, responsive and optimized)☆212Aug 8, 2023Updated 2 years ago
- EternalHush - java-based open-source c2 framework that targets Microsoft Windows☆27Updated this week
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆32Oct 11, 2020Updated 5 years ago
- A SIEM inspired by HECTOR, built on Django.☆27Apr 16, 2019Updated 6 years ago
- A lightweight C++ library designed for function interception within injected DLLs, providing a streamlined approach to modifying applicat…☆41Oct 19, 2023Updated 2 years ago
- Just another vulnerable web application.☆36Jul 27, 2024Updated last year
- EndExt is a .go tool for extracting all the possible endpoints from the JS files☆219Jul 14, 2024Updated last year
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆139Jul 27, 2023Updated 2 years ago
- ☆38Jun 5, 2023Updated 2 years ago
- Free training course offered at Hack Space Con 2023☆138Apr 13, 2023Updated 2 years ago
- ☆66Jan 14, 2023Updated 3 years ago
- How to bypass your Bell Aliant provided modems.☆12Feb 2, 2026Updated last week
- ☆35Dec 6, 2023Updated 2 years ago
- ☆138Apr 20, 2023Updated 2 years ago