Describing and documenting the process of deploying a HomeLab for security research and training
☆43May 2, 2025Updated 10 months ago
Alternatives and similar repositories for Cybersecurity-HomeLab
Users that are interested in Cybersecurity-HomeLab are comparing it to the libraries listed below
Sorting:
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆51Jun 21, 2025Updated 8 months ago
- OOB listener powered by cloudflare workers☆12Apr 13, 2025Updated 10 months ago
- ☆10Apr 14, 2025Updated 10 months ago
- ☆16Jul 8, 2024Updated last year
- The SOLVE-IT knowledge base for digital forensics☆60Updated this week
- Short Python script for parsing Defender VDM signature files.☆10Sep 22, 2024Updated last year
- Offensive recon with GitHub Actions☆11Aug 25, 2024Updated last year
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Feb 6, 2025Updated last year
- Small wiki for Mobile Application Penetration Testing Tools☆12Apr 8, 2021Updated 4 years ago
- ☆12Apr 20, 2025Updated 10 months ago
- ☆13Dec 12, 2022Updated 3 years ago
- IBM iQuHACK 2024 In-Person Challenge☆13Feb 6, 2024Updated 2 years ago
- Draugnet is a lightweight, open-source tool for anonymous cyber threat reporting. Built for the MISP ecosystem, it lets users submit and …☆20Updated this week
- This tool is designed to seamlessly convert Postman collections into OpenAPI schemas. This conversion is essential for API security testi…☆12Sep 3, 2024Updated last year
- Discord Bot for Realtime Updates from CTFd☆10Jan 10, 2021Updated 5 years ago
- ☆10Jan 8, 2023Updated 3 years ago
- A small WinRM client designed for interacting with JEA endpoints.☆13Aug 29, 2024Updated last year
- ☆10Aug 9, 2024Updated last year
- Source Code for 'Cryptography and Cryptanalysis in MATLAB' by Marius Iulian Mihailescu and Stefania Loredana Nita☆14Sep 14, 2021Updated 4 years ago
- Windows Shell Link (LNK) Proof of Concept☆16Jul 19, 2025Updated 7 months ago
- Code samples discussed during DEFCON Red Team Village Talk -- "Yippee-Ki-Yay MFA'er - Bypassing Multi-Factor Authentication with Real-Tim…☆10Jul 29, 2020Updated 5 years ago
- ☆13May 18, 2022Updated 3 years ago
- WISKESS automates the Windows evidence processing for Incident Response investigations. Rust version.☆16Oct 16, 2025Updated 4 months ago
- shellcode obfuscater and runner in golang☆11Aug 13, 2023Updated 2 years ago
- ☆14Dec 24, 2024Updated last year
- Kudzu is a Go C2 platform with an emphasis on extensibility.☆11Mar 30, 2021Updated 4 years ago
- Advanced Sub-domain Enumerator☆10Mar 14, 2020Updated 5 years ago
- MailHunter is a tool to give you access to the exchange server mails.☆12Apr 16, 2021Updated 4 years ago
- ☆19Jul 23, 2025Updated 7 months ago
- The Shodan MCP Server by ADEO Cybersecurity Services provides cybersecurity professionals with streamlined access to Shodan's powerful re…☆20Mar 22, 2025Updated 11 months ago
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxes☆12Apr 2, 2021Updated 4 years ago
- The primary objective of this project is to develop a cross-platform Python library capable of simulating the core fundamental functional…☆58Jan 19, 2026Updated last month
- A tool to check for response status codes with ease☆13Apr 29, 2023Updated 2 years ago
- Indirect Prompt Injection Methodology (IPIM) - A structured process which security professionals can use to find Indirect Prompt Injectio…☆18Jul 28, 2025Updated 7 months ago
- Resources related to Hack The Box Meetup Zurich, CH☆14Jan 22, 2026Updated last month
- Menu for Thor scanner lite☆20Oct 24, 2025Updated 4 months ago
- Red Team Projects with chat.openai.com.☆17Apr 3, 2023Updated 2 years ago
- ☆10Oct 25, 2020Updated 5 years ago
- Defending OT with ATT&CK provides a customized threat collection tailored to the attack surface and threat model of operational technolog…☆13May 28, 2025Updated 9 months ago