☆55Apr 24, 2020Updated 5 years ago
Alternatives and similar repositories for Cyber-Security_Collection
Users that are interested in Cyber-Security_Collection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆11Sep 7, 2023Updated 2 years ago
- qemu-system by docker-compose☆13Jun 14, 2022Updated 3 years ago
- All Security Engineering Resources☆15Feb 2, 2018Updated 8 years ago
- 最全中华古诗词数据库, 唐宋两朝近一万四千古诗人, 接近5.5万首唐诗加26万宋诗. 两宋时期1564位词人,21050首词。☆13Feb 9, 2018Updated 8 years ago
- A binary-only coverage-guided fuzzer based on AFL and e9patch☆22Oct 13, 2020Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Python 3 bridge to IDA's Python environment☆17Aug 27, 2020Updated 5 years ago
- Investigating the bug behind CVE-2021-26708☆28Feb 16, 2021Updated 5 years ago
- ☆11Feb 9, 2023Updated 3 years ago
- This is an IDA plugin to recover class information from C++ binary.☆19Aug 4, 2020Updated 5 years ago
- Assess certain AWS network configurations☆12Aug 22, 2018Updated 7 years ago
- SBOM-TOOL is a ctl tool that generates software bill of materials (SBOM) for software projects through source code warehouse, code finger…☆13Oct 11, 2025Updated 5 months ago
- AuthMatrix is a Burp Suite extension that provides a simple way to test authorization in web applications and web services.☆47Sep 6, 2023Updated 2 years ago
- 🌌 Real-time threat detection for smart contracts☆10May 16, 2023Updated 2 years ago
- A proof-of-concept to demonstrate randomized execution paths and their impact on call stack signatures — ideal for EDR testing, behavior-…☆24Jan 17, 2026Updated 2 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A query tool on networkx☆17Jan 22, 2025Updated last year
- 林中有两条路,我选择了人迹罕至的一条☆33May 31, 2022Updated 3 years ago
- Hide information in the wave data of .wav file by using the least significant bits☆10Jul 13, 2021Updated 4 years ago
- 这里存放的是我们团队做CTF题目的时候经常用到的一些工具☆11Nov 5, 2018Updated 7 years ago
- Proof-of-concept web app built on top of Frida☆22Apr 11, 2015Updated 10 years ago
- Browser Vulnerability Exploit DB(浏览器漏洞PoC数据库)☆10Feb 7, 2017Updated 9 years ago
- Now use your favorite Google Dorks techniques to find vulnerabilities and earn Bounties.☆31Oct 1, 2020Updated 5 years ago
- Python Digital Forensics [video], published by Packt☆21Jan 30, 2023Updated 3 years ago
- Modular Buffer Overflow Fuzzer and Exploitation Tool☆10Aug 28, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Security research helper for CLFS drivers☆16Sep 5, 2024Updated last year
- A simple bash virus (without payload) for the second assignment of the "Malware analysis and design" course in Master Degree in Computer …☆13Oct 16, 2017Updated 8 years ago
- POC Pdf-exploit builder on C#☆13Mar 1, 2024Updated 2 years ago
- Detection Engineering Tools☆25Mar 20, 2026Updated last week
- ☆31May 28, 2023Updated 2 years ago
- research and survey papers related to IoT security from 2014 to the first half of 2019☆59Jun 14, 2020Updated 5 years ago
- The PoC for CVE-2025-70795 / CVE-2026-0828 and updated driver☆41Mar 13, 2026Updated 2 weeks ago
- The OWASP Amass Homebrew Formula☆17Jul 13, 2025Updated 8 months ago
- 让ELF以特定libc链接运行,带符号版本☆14Mar 10, 2020Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- CommonsBeanutils1,CommonsCollectionsK1☆58Nov 16, 2020Updated 5 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆11Jan 6, 2022Updated 4 years ago
- ☆14Jul 27, 2020Updated 5 years ago
- A vuln existss in Tenda AC6 router which allows an attacker to launch a telnet session with root access.☆19Dec 29, 2020Updated 5 years ago
- Frontend to import Nmap Scan in ES, and frontend to make search☆10Nov 16, 2014Updated 11 years ago
- Queries for Carbon Black Response☆11Feb 11, 2020Updated 6 years ago
- Odoo 12.0 allows remote attackers to read local files.☆11Jun 11, 2020Updated 5 years ago