List of some cybersecurity conferences
☆59Apr 23, 2026Updated 2 weeks ago
Alternatives and similar repositories for CyberSecurity_Conferences
Users that are interested in CyberSecurity_Conferences are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Super Repository streamlines package and tool installations on Linux. It combines a variety of packages, tools, and repositories from off…☆22Jan 7, 2024Updated 2 years ago
- My OSCP notes. Might help you! Happy to get feedback to improve this package.☆25Jun 24, 2025Updated 10 months ago
- A modified version of TomNomNom's anew, allowing for multiple files to be defined as parameters.☆13Jun 17, 2023Updated 2 years ago
- A curated malware database with more then +73000 samples.☆19Feb 20, 2021Updated 5 years ago
- Kernel Mode Driver for Elevating Process Privileges☆132Mar 23, 2023Updated 3 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- A massive, curated collection of information security books, study guides, cheat sheets, and resources. This library is intended for educ…☆149Feb 8, 2026Updated 3 months ago
- copy of original for audit. will be remove soon☆14Mar 6, 2020Updated 6 years ago
- The infamous Raidforums.com MyBB Theme. (Ripped by @xbdmHQ)☆10Jul 21, 2023Updated 2 years ago
- Simple 5060 port exploit that calls to a receiver device with pre-setuped phrase☆34Jul 5, 2022Updated 3 years ago
- Script to test NetSec capabilities.☆21May 1, 2023Updated 3 years ago
- Threat Hunter's Knowledge Base☆22Dec 27, 2021Updated 4 years ago
- Learning material for completely newcomers in the field of BOFs☆16Apr 11, 2020Updated 6 years ago
- Open-source intelligence (OSINT)☆15Mar 1, 2024Updated 2 years ago
- Threat Intel and Incident Reponse☆10Aug 29, 2018Updated 7 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆10May 29, 2023Updated 2 years ago
- An advanced Node.js plug-and-play interface to the Exiftool CLI. 🚀☆12Apr 3, 2023Updated 3 years ago
- An Online Collection of Open Source Intelligence Tools☆12Mar 23, 2023Updated 3 years ago
- The resources stored in this repository cover data science topics applied to cybersecurity environments.☆25Jun 26, 2020Updated 5 years ago
- Repository containing slides for conferences I have spoken at.☆16Sep 28, 2024Updated last year
- PassMute - A multi featured Password Transmutation/Mutator Tool☆55Jun 18, 2023Updated 2 years ago
- A Personal Collection of Infosec Dorks☆214Jun 14, 2023Updated 2 years ago
- A repo for UVa's CS 4630, Defense Against the Dark Arts course☆18Apr 24, 2026Updated 2 weeks ago
- Central IoC scanner based on Loki☆20Nov 12, 2021Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆32Oct 11, 2023Updated 2 years ago
- ☆41Feb 25, 2026Updated 2 months ago
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Jul 23, 2020Updated 5 years ago
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆139Jul 27, 2023Updated 2 years ago
- ☆138Apr 20, 2023Updated 3 years ago
- Drone detection using the computer's wireless network adapter☆14Jul 10, 2019Updated 6 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Jul 11, 2022Updated 3 years ago
- A commercial grade threat intelligence feed thats validated and updated every half hour.☆19Mar 24, 2023Updated 3 years ago
- Arcane Sector game - a CTF task, or old-school (MMO)RPG - depending on the perspective. The code is of terrible quality, you have been w…☆31Nov 12, 2019Updated 6 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆24Jan 26, 2021Updated 5 years ago
- A custom Google search (to bypass some limitations on google and VPNs)☆116Jul 7, 2023Updated 2 years ago
- Ded Security Framework is a tool aimed at security professionals☆36May 12, 2024Updated last year
- Collection of scripts and tools related to the eCTHPv2 exam by INE.☆19Jun 12, 2022Updated 3 years ago
- A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference☆21Apr 14, 2021Updated 5 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆11Aug 11, 2021Updated 4 years ago
- macos-collector - Automated Collection of macOS Forensic Artifacts for DFIR☆43Apr 13, 2026Updated 3 weeks ago