Describing and documenting the process of deploying a HomeLab for security research and training
☆43May 2, 2025Updated 10 months ago
Alternatives and similar repositories for Cybersecurity-HomeLab
Users that are interested in Cybersecurity-HomeLab are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Web app that provides basic navigation and annotation of ATT&CK matrices☆17Nov 7, 2020Updated 5 years ago
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆51Jun 21, 2025Updated 9 months ago
- Tom's Homelab mono repository☆22Updated this week
- A PowerShell-based script to analyze network logs from CSV files and detect potential beaconing behavior. Supports VirusTotal integration…☆17May 11, 2025Updated 10 months ago
- This repository contains all labs for the Phase 2 Cybersecurity and Ethical Hacking Internship. Labs cover ethical hacking, penetration t…☆23Oct 17, 2025Updated 5 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Short Python script for parsing Defender VDM signature files.☆10Sep 22, 2024Updated last year
- this repository made to help me All Dorking repositories find for one location☆36Aug 31, 2025Updated 6 months ago
- Public exploits☆16May 28, 2018Updated 7 years ago
- ☆23May 28, 2021Updated 4 years ago
- Draugnet is a lightweight, open-source tool for anonymous cyber threat reporting. Built for the MISP ecosystem, it lets users submit and …☆20Updated this week
- This Python script aims to enhance your online privacy and security by automatically rotating your DNS settings at a set interval (defaul…☆36Jan 31, 2026Updated last month
- Repo to track SANS BlueTeam Summit Presentation☆23Oct 4, 2022Updated 3 years ago
- Internal Network Penetration Test Playbook☆17Apr 18, 2022Updated 3 years ago
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Jun 5, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Menu for Thor scanner lite☆20Oct 24, 2025Updated 5 months ago
- The primary objective of this project is to develop a cross-platform Python library capable of simulating the core fundamental functional…☆60Mar 4, 2026Updated 3 weeks ago
- IBM iQuHACK 2024 In-Person Challenge☆14Feb 6, 2024Updated 2 years ago
- ☆16Jul 8, 2024Updated last year
- Source Code for 'Cryptography and Cryptanalysis in MATLAB' by Marius Iulian Mihailescu and Stefania Loredana Nita☆14Sep 14, 2021Updated 4 years ago
- Defending OT with ATT&CK provides a customized threat collection tailored to the attack surface and threat model of operational technolog…☆13May 28, 2025Updated 10 months ago
- rust port of pspy with support for process monitoring over dbus☆37Jan 4, 2026Updated 2 months ago
- A repository to store community malware research notes and findings.☆15Feb 13, 2026Updated last month
- An Operating System in Rust☆12Jul 29, 2025Updated 8 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Field reference for BTL1 and Tier 1 SOC work — grep-ready cheatsheets, SPL queries, Volatility workflows, live response commands☆96Mar 16, 2026Updated 2 weeks ago
- ☆35Feb 24, 2026Updated last month
- WISKESS automates the Windows evidence processing for Incident Response investigations. Rust version.☆16Updated this week
- This repository contains Loadable Kernel Modules (LKM) and LD_PRELOAD-based modules designed for penetration testing, red teaming, and se…☆13Feb 15, 2025Updated last year
- A powershell module for hiding payloads in the pixels of images☆81Jul 6, 2024Updated last year
- Sometimes, threat feeds share critical information with certain details blurred, which is a good practice. However, CTI analysts still ne…☆12Sep 18, 2025Updated 6 months ago
- CLI interface to get Ransomware attacks data from ransomwhat.telemetry.ltd☆13Feb 8, 2023Updated 3 years ago
- Follow the trail of breadcrumbs left behind by any user on a computer or mounted disk image.☆32Aug 28, 2025Updated 7 months ago
- Browser Reviewer is a portable forensic tool for analyzing user activity in Firefox and Chrome-based browsers. It extracts and displays b…☆55Oct 10, 2025Updated 5 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆24Dec 31, 2025Updated 2 months ago
- Showcasing my learning progress and skills acquired over the years.☆18May 3, 2025Updated 10 months ago
- Resources related to Hack The Box Meetup Zurich, CH☆15Jan 22, 2026Updated 2 months ago
- Small wiki for Mobile Application Penetration Testing Tools☆12Apr 8, 2021Updated 4 years ago
- The SOLVE-IT knowledge base for digital forensics☆74Updated this week
- A simple command line tool which quickly audits the Disallow entries of a site's robots.txt.☆23Apr 5, 2023Updated 2 years ago
- In this repository you will find sample commands and test files for each day of the course "Linux for OSINT. A 21-day course for beginner…☆584Jan 6, 2026Updated 2 months ago