WatchTower - A platform to save your valuable time while staying updated in the Cyber realm.
☆18Dec 31, 2025Updated 2 months ago
Alternatives and similar repositories for WatchTower
Users that are interested in WatchTower are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆10Mar 17, 2024Updated 2 years ago
- Control a system remotely via telegram in Powershell☆14Mar 28, 2025Updated 11 months ago
- Building a consolidated RSS feed for articles about cyberattacks☆74Updated this week
- Burp Extender to add unique form tokens to scanner requests.☆13Nov 5, 2024Updated last year
- A tool for extracting and filtering URLs, IPs, domains, and subdomains from text or web pages, with built-in web scraping capabilities.☆14Mar 10, 2025Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- FSL Test bench - Ansible playbook repository to setup a save environment for security auditing and testing. It can be used for teaching s…☆30Nov 26, 2024Updated last year
- BloodHound Automation: Collection, Analysis and Data Import☆19Nov 12, 2025Updated 4 months ago
- Nuclei template for CVE-2024-23897 (Jenkins LFI Vulnerability)☆21Feb 5, 2024Updated 2 years ago
- A Python Implementation of XQ Message SDK (V.2) which provides convenient access to the XQ Message API.☆11Feb 18, 2026Updated last month
- A command-line utility for working with URLs.☆10Dec 8, 2025Updated 3 months ago
- A Selenium scraper for public domain search tools.☆18Oct 27, 2024Updated last year
- Cyences App (Cyber Defense) built by CrossRealms International - https://splunkbase.splunk.com/app/5351/☆11Mar 17, 2026Updated last week
- Username recon OSINT. Accurate hits! New sites to check, Simple and powerful tool. Goverments use this tool or similar tools built in dif…☆19Feb 19, 2026Updated last month
- This project focuses on detecting cyberattacks using advanced analytical techniques and a deep learning model. It leverages structured da…☆10Feb 21, 2025Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- .files are very cool☆17Mar 12, 2026Updated 2 weeks ago
- A ZAPROXY Add-on that allows testing of web application vulnerabilities by recording complex multi-step sequences. You can test applica…☆22May 14, 2025Updated 10 months ago
- Welcome Hackers, this is your go-to resource for learning cybersecurity stuff everyday :)☆44Updated this week
- Core Submodule of Exploration C2☆24Jan 27, 2026Updated last month
- A webshell plugin and interactive shell for pentesting a LimeSurvey application.☆23Oct 31, 2024Updated last year
- A set of scripts to facilitate HTTP interception on mobile apps☆20Mar 11, 2026Updated 2 weeks ago
- A Ruby DSL for crafting SQL Injections☆46Jan 12, 2026Updated 2 months ago
- s3eker is an extensible way to find open S3 buckets.☆17Jul 31, 2020Updated 5 years ago
- Cybersecurity Roadmap - Tools Installer - Check List - Methodology - Cheat Sheet☆15Feb 27, 2026Updated last month
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆32Mar 19, 2026Updated last week
- This repo shares blue team security notes and resources for detecting and preventing cyber attacks. Topics covered include email, file, l…☆52Apr 5, 2025Updated 11 months ago
- The Covert Channel Educational Analysis Protocol (CCEAP) is a network protocol designed for teaching covert channels to professionals and…☆15Apr 17, 2025Updated 11 months ago
- RobotScraper is a simple tool written in Python to check each of the paths found in the robots.txt file and what HTTP response code they …☆14Jul 23, 2024Updated last year
- portfolio idea for your next project☆20Dec 5, 2024Updated last year
- Script para la instalación automática de una capa de personalización en Kali Linux OS.☆17Mar 14, 2026Updated last week
- A python library to interact with Pwndoc instances for pentest reports generation☆24May 19, 2025Updated 10 months ago
- A Python package and command line utility for scanning emails with YARA rules☆21Jan 23, 2026Updated 2 months ago
- ASNPepper - Recon in ASN - Extracting CIDR's - Fast and efficient scanning☆19Oct 27, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A tech enumeration toolkit focused on 404 Not found pages.☆27Oct 6, 2024Updated last year
- Cyber Equipment for Carrying out Pentesting and Server Defense from Hacker Attack Activities☆19Oct 16, 2025Updated 5 months ago
- A Python-native Detection as Code Framework☆19Jan 23, 2026Updated 2 months ago
- A script to automatically dump all URLs present in /server-status to a file locally.☆24Feb 11, 2025Updated last year
- Run TOR conveniently from a multi-platform docker container.☆25Mar 17, 2026Updated last week
- CLI tool for filtering URLs/IPs with automatically-updated Bug Bounty program scope rules.☆35Dec 31, 2025Updated 2 months ago
- 🔓 CLI tool to decrypt backup files exported from the 2FAS Authenticator app. This application is neither affiliated with Two Factor Auth…☆23Mar 17, 2026Updated last week