This list of tools is meant to act as a staple resource for Small to Medium businesses. We understand the hardship of not being able to afford adequate security. We are firm believers that everyone deserves to be secure at a cost effective rate.
☆49May 15, 2020Updated 5 years ago
Alternatives and similar repositories for Open-Source-Security-List-
Users that are interested in Open-Source-Security-List- are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Web based analysis platform for use with the AWS_IR command line tool.☆17Aug 4, 2016Updated 9 years ago
- ☆21Aug 26, 2021Updated 4 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Aug 16, 2022Updated 3 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆23Mar 3, 2019Updated 7 years ago
- Python3 Ebowla... 3Bowla☆17Jan 7, 2020Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆20Nov 23, 2022Updated 3 years ago
- ☆22Jul 27, 2020Updated 5 years ago
- Tools to search through massive amounts of data☆21Oct 20, 2025Updated 6 months ago
- Pi-hole Remote Code Execution authenticated Version >= 4.3.2☆11Aug 5, 2020Updated 5 years ago
- ☆14May 30, 2018Updated 7 years ago
- ☆13Aug 13, 2019Updated 6 years ago
- CPH:SEC - Copenhagen Ethical Hacking and Penetration Testing Society☆44Oct 6, 2022Updated 3 years ago
- IPV6 MITM attack tool☆92Aug 7, 2013Updated 12 years ago
- How to flash a Proxmark3 with a Raspberry PI 3 by using the JTAG interface.☆14Nov 12, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A list of Per-Reviewed Journals, Books and Blogs on intelligence and Cybersecurity☆26Apr 1, 2024Updated 2 years ago
- Collection of things made during my SLAE 32-bit journey☆14Feb 24, 2022Updated 4 years ago
- Exports MISP events to STIX and ingest into McAfee ESM☆15Feb 12, 2020Updated 6 years ago
- Adapt practically persistence steadiness strategies working at Windows 10 utilized by sponsored nation-state threat actors, as Turla, Pro…☆22Dec 11, 2020Updated 5 years ago
- Fuzz for hidden proxies, vhosts, and URLs☆15Apr 1, 2026Updated last month
- Maltego Transforms for generating screenshots from Websites and URLs☆16Apr 24, 2023Updated 3 years ago
- Just a place to share some things I've written while participating in Hack The Box.☆18Jun 5, 2020Updated 5 years ago
- Collection of danish base wordlists for cracking danish passwords (Hashcat, John the Ripper etc.)☆30Jan 11, 2023Updated 3 years ago
- This is repo with my custom zsh completion files for pentesting tools, which do not exist in zsh and oh-my-zsh by default☆12Oct 23, 2025Updated 6 months ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Jul 27, 2018Updated 7 years ago
- graffiti sends ASCII-art texts to remote webserver logs using consecutive 404 errors☆35Aug 13, 2019Updated 6 years ago
- Automated PowerShell installer for *Nix with multi Distro support.☆20Nov 21, 2018Updated 7 years ago
- A repository with custom Danish wordlists and other ressources for cracking Danish passwords with Hashcat or similar tools.☆29Apr 20, 2020Updated 6 years ago
- SSH brute-force script created for HackTheBox☆16Mar 26, 2020Updated 6 years ago
- A gc and wii homebrew app to that sends a binary to the GBA using the different multiboot protocol used by the third generation of Pokémo…☆17Feb 26, 2017Updated 9 years ago
- Determine everything you need to know to about a system☆32Sep 13, 2018Updated 7 years ago
- POC for utilizing wikipedia API for Command and Control☆29Dec 8, 2022Updated 3 years ago
- A collection of cybersecurity challenges from the CTF Wastelands organized by Interlogica, featuring Docker-based deployment and comprehe…☆13Jul 12, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Automate SSH communication with firewalls, switches, etc.☆28Mar 29, 2018Updated 8 years ago
- Docker Container to deploy Mitre Caldera Automated Adversary Emulation System☆26Sep 26, 2020Updated 5 years ago
- Ruby Regular Expression Helper Gem☆17Oct 30, 2016Updated 9 years ago
- find where an image is taken☆18Jul 14, 2022Updated 3 years ago
- A PoC .net shell which uses a GitHub.com repository for the communication channel.☆11Oct 25, 2018Updated 7 years ago
- 🐧 A curated collection of free, high quality resources to learn Linux, the command line, and system fundamentals.☆22Mar 20, 2026Updated last month
- Vampire is an aggressor script which integrates with BloodHound to mark nodes as owned.☆79Apr 6, 2021Updated 5 years ago