List of some cybersecurity conferences
☆59Feb 8, 2026Updated last month
Alternatives and similar repositories for CyberSecurity_Conferences
Users that are interested in CyberSecurity_Conferences are comparing it to the libraries listed below
Sorting:
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆77Nov 12, 2023Updated 2 years ago
- A modified version of TomNomNom's anew, allowing for multiple files to be defined as parameters.☆13Jun 17, 2023Updated 2 years ago
- A curated malware database with more then +73000 samples.☆20Feb 20, 2021Updated 5 years ago
- APK Infrastructure Investigator☆64Jun 20, 2023Updated 2 years ago
- Kernel Mode Driver for Elevating Process Privileges☆132Mar 23, 2023Updated 2 years ago
- A massive, curated collection of information security books, study guides, cheat sheets, and resources. This library is intended for educ…☆143Feb 8, 2026Updated last month
- Simple 5060 port exploit that calls to a receiver device with pre-setuped phrase☆34Jul 5, 2022Updated 3 years ago
- Script to test NetSec capabilities.☆21May 1, 2023Updated 2 years ago
- Filter Domains From Your Google Search Results☆11Mar 2, 2025Updated last year
- Open-source intelligence (OSINT)☆15Mar 1, 2024Updated 2 years ago
- ☆20Dec 29, 2024Updated last year
- Threat Intel and Incident Reponse☆10Aug 29, 2018Updated 7 years ago
- ☆10May 29, 2023Updated 2 years ago
- An advanced Node.js plug-and-play interface to the Exiftool CLI. 🚀☆12Apr 3, 2023Updated 2 years ago
- An Online Collection of Open Source Intelligence Tools☆12Mar 23, 2023Updated 2 years ago
- ☆28Nov 25, 2025Updated 3 months ago
- PassMute - A multi featured Password Transmutation/Mutator Tool☆54Jun 18, 2023Updated 2 years ago
- OSINT for Kyrgyz Republic☆16Apr 13, 2025Updated 11 months ago
- A Personal Collection of Infosec Dorks☆213Jun 14, 2023Updated 2 years ago
- A repo for UVa's CS 4630, Defense Against the Dark Arts course☆18Dec 5, 2017Updated 8 years ago
- Central IoC scanner based on Loki☆20Nov 12, 2021Updated 4 years ago
- RegStrike is a .reg payload generator☆58Sep 19, 2023Updated 2 years ago
- Yet Another Memory Analyzer for malware detection☆24Aug 4, 2023Updated 2 years ago
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Jul 23, 2020Updated 5 years ago
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆139Jul 27, 2023Updated 2 years ago
- ☆138Apr 20, 2023Updated 2 years ago
- Drone detection using the computer's wireless network adapter☆13Jul 10, 2019Updated 6 years ago
- CScorza Web - Insieme di tutti gli strumenti OSINT e Digital Forensics☆23Dec 8, 2025Updated 3 months ago
- Threat Hunt Investigation Methodology and Procedure☆15Jul 11, 2022Updated 3 years ago
- Arcane Sector game - a CTF task, or old-school (MMO)RPG - depending on the perspective. The code is of terrible quality, you have been w…☆30Nov 12, 2019Updated 6 years ago
- This config file will automatically convert a temporary Windows Sandbox environment into a Flare VM for malware analysis.☆11Jan 3, 2025Updated last year
- Apply Machine Learning and Game Theory to improve the security of the Turris network of CZ.NIC☆24Sep 24, 2019Updated 6 years ago
- 针对多个框架的高度自定义的内存马一键打入工具 | A highly customized memory shell one-click injection tool for multiple frameworks☆49Feb 6, 2024Updated 2 years ago
- The code in this repository which function is to extract the shellcode from the maldoc.☆10Jul 17, 2023Updated 2 years ago
- A list of OSINT resources and tools that may be useful to you when conducting investigations related to The United Kingdom☆19Oct 8, 2025Updated 5 months ago
- A list of DEF CON groups around the world! Discover and connect with a local DCG near you.☆51Jul 24, 2025Updated 7 months ago
- Ded Security Framework is a tool aimed at security professionals☆35May 12, 2024Updated last year
- Collection of scripts and tools related to the eCTHPv2 exam by INE.☆19Jun 12, 2022Updated 3 years ago
- An application that prevents accidental double-clicks by introducing a customizable delay between mouse clicks☆27Jan 10, 2026Updated 2 months ago