☆55Apr 24, 2020Updated 5 years ago
Alternatives and similar repositories for Cyber-Security_Collection
Users that are interested in Cyber-Security_Collection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆11Sep 7, 2023Updated 2 years ago
- All Security Engineering Resources☆15Feb 2, 2018Updated 8 years ago
- Nessus Cheat Sheet in HTML, PDF, PNG, ADOC☆12Apr 10, 2022Updated 4 years ago
- this repo contains some public methodologies which I found from internet (google,telegram,discord,writeups etc..)☆31May 30, 2024Updated last year
- All the latest releases and files for x64dbg...☆13Nov 23, 2020Updated 5 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Digital Forensics date and time☆23Apr 12, 2026Updated last week
- 最全中华古诗词数据库, 唐宋两朝近一万四千古诗人, 接近5.5万首唐诗加26万宋诗. 两宋时期1564位词人,21050首词。☆13Feb 9, 2018Updated 8 years ago
- CTF-RSA-tool☆19Nov 27, 2019Updated 6 years ago
- A binary-only coverage-guided fuzzer based on AFL and e9patch☆22Oct 13, 2020Updated 5 years ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆53Jul 27, 2022Updated 3 years ago
- Investigating the bug behind CVE-2021-26708☆28Feb 16, 2021Updated 5 years ago
- ☆11Feb 9, 2023Updated 3 years ago
- This is an IDA plugin to recover class information from C++ binary.☆19Aug 4, 2020Updated 5 years ago
- Assess certain AWS network configurations☆12Aug 22, 2018Updated 7 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- SBOM-TOOL is a ctl tool that generates software bill of materials (SBOM) for software projects through source code warehouse, code finger…☆13Oct 11, 2025Updated 6 months ago
- Insider threat detection via bert☆23Jan 13, 2022Updated 4 years ago
- 🌌 Real-time threat detection for smart contracts☆10May 16, 2023Updated 2 years ago
- A proof-of-concept to demonstrate randomized execution paths and their impact on call stack signatures — ideal for EDR testing, behavior-…☆24Jan 17, 2026Updated 3 months ago
- Hide information in the wave data of .wav file by using the least significant bits☆13Jul 13, 2021Updated 4 years ago
- 这里存放的是我们团队做CTF题目的时候经常用到的一些工具☆11Nov 5, 2018Updated 7 years ago
- 林中有两条路,我选择了人迹罕至的一条☆33May 31, 2022Updated 3 years ago
- Python Digital Forensics [video], published by Packt☆21Jan 30, 2023Updated 3 years ago
- Modular Buffer Overflow Fuzzer and Exploitation Tool☆10Aug 28, 2019Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A simple bash virus (without payload) for the second assignment of the "Malware analysis and design" course in Master Degree in Computer …☆13Oct 16, 2017Updated 8 years ago
- Security research helper for CLFS drivers☆16Sep 5, 2024Updated last year
- POC Pdf-exploit builder on C#☆13Mar 1, 2024Updated 2 years ago
- Blazing Fast PHP application server☆13Sep 17, 2021Updated 4 years ago
- CLI Search for Security Operators of MITRE ATT&CK URLs☆17Jan 5, 2023Updated 3 years ago
- ETHICAL-HACKING☆13Dec 20, 2023Updated 2 years ago
- ☆31May 28, 2023Updated 2 years ago
- Legacy password hashing framework for PHP applications needing to support or having previously supported PHP below 5.5☆15Nov 22, 2024Updated last year
- Generate representative samples from Pwned Passwords (HIBP)☆11Jan 6, 2022Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A vuln existss in Tenda AC6 router which allows an attacker to launch a telnet session with root access.☆19Dec 29, 2020Updated 5 years ago
- Perform file-based malware scan on your on-prem servers with AWS☆14Oct 31, 2023Updated 2 years ago
- Frontend to import Nmap Scan in ES, and frontend to make search☆10Nov 16, 2014Updated 11 years ago
- ☆23Nov 2, 2021Updated 4 years ago
- A trojan horse practice just for learning purposes☆13Dec 13, 2014Updated 11 years ago
- .NET Reverse Shell☆16Sep 24, 2016Updated 9 years ago
- The list of commonly used Redhat command for Linux System Administration☆12Nov 4, 2022Updated 3 years ago