Describing and documenting the process of deploying a HomeLab for security research and training
☆43May 2, 2025Updated last year
Alternatives and similar repositories for Cybersecurity-HomeLab
Users that are interested in Cybersecurity-HomeLab are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Pentester's toolbox☆12May 1, 2026Updated 2 weeks ago
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆53Jun 21, 2025Updated 11 months ago
- A PowerShell-based script to analyze network logs from CSV files and detect potential beaconing behavior. Supports VirusTotal integration…☆17May 11, 2025Updated last year
- A comprehensive GenAI protection system designed to protect against malicious prompts, injection attacks, and harmful content. System inc…☆101Oct 15, 2025Updated 7 months ago
- this repository made to help me All Dorking repositories find for one location☆36Aug 31, 2025Updated 8 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Windows Shell Link (LNK) Proof of Concept☆16Jul 19, 2025Updated 10 months ago
- Public exploits☆16May 28, 2018Updated 7 years ago
- ☆23May 28, 2021Updated 4 years ago
- Draugnet is a lightweight, open-source tool for anonymous cyber threat reporting. Built for the MISP ecosystem, it lets users submit and …☆20Mar 24, 2026Updated last month
- This Python script aims to enhance your online privacy and security by automatically rotating your DNS settings at a set interval (defaul…☆41May 10, 2026Updated last week
- Internal Network Penetration Test Playbook☆17Apr 18, 2022Updated 4 years ago
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Jun 5, 2023Updated 2 years ago
- A public repository of MITRE ATT&ACK TTP mappings by BushidoUK for OSINT reports that lack a section breaking down the TTPs.☆27Mar 20, 2025Updated last year
- The primary objective of this project is to develop a cross-platform Python library capable of simulating the core fundamental functional…☆63May 5, 2026Updated 2 weeks ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- The Shodan MCP Server by ADEO Cybersecurity Services provides cybersecurity professionals with streamlined access to Shodan's powerful re…☆20Mar 22, 2025Updated last year
- IBM iQuHACK 2024 In-Person Challenge☆14Feb 6, 2024Updated 2 years ago
- ☆16Jul 8, 2024Updated last year
- rust port of pspy with support for process monitoring over dbus☆37Jan 4, 2026Updated 4 months ago
- Field reference for BTL1 and Tier 1 SOC work — grep-ready cheatsheets, SPL queries, Volatility workflows, live response commands☆107Mar 16, 2026Updated 2 months ago
- An Operating System in Rust☆12Jul 29, 2025Updated 9 months ago
- Defending OT with ATT&CK provides a customized threat collection tailored to the attack surface and threat model of operational technolog…☆15May 28, 2025Updated 11 months ago
- WISKESS automates the Windows evidence processing for Incident Response investigations. Rust version.☆16May 12, 2026Updated last week
- CLI interface to get Ransomware attacks data from ransomwhat.telemetry.ltd☆13Feb 8, 2023Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Sometimes, threat feeds share critical information with certain details blurred, which is a good practice. However, CTI analysts still ne…☆12Sep 18, 2025Updated 8 months ago
- ☆36Feb 24, 2026Updated 2 months ago
- A powershell module for hiding payloads in the pixels of images☆80Jul 6, 2024Updated last year
- ICS/OT related Wireshark profiles + adding some other (IT or OT related) Open Source Wireshark Profiles☆18Mar 21, 2025Updated last year
- Follow the trail of breadcrumbs left behind by any user on a computer or mounted disk image.☆31Aug 28, 2025Updated 8 months ago
- Portable Windows forensic tool for reviewing Firefox-like and Chromium-based browser artifacts, with labeling, search, CLI processing, an…☆57May 10, 2026Updated last week
- ZeroProbe is an advanced enumeration and analysis framework designed for exploit developers, security researchers, and red teamers. It pr…☆107Mar 10, 2025Updated last year
- Helm chart for Open Cyber Threat Intelligence Platform☆35Updated this week
- Small wiki for Mobile Application Penetration Testing Tools☆12Apr 8, 2021Updated 5 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆26Dec 31, 2025Updated 4 months ago
- A simple command line tool which quickly audits the Disallow entries of a site's robots.txt.☆23Apr 5, 2023Updated 3 years ago
- This tool can gather a lot of info without any defender alerts. It is useful for Penetration testers, SOC Analysts, System administrators…☆29Apr 9, 2025Updated last year
- Binary Ninja plugin for interacting with the OALabs HashDB service☆21Nov 1, 2024Updated last year
- The SOLVE-IT knowledge base for digital forensics☆81May 14, 2026Updated last week
- Fast Path Traversal exploitation tool☆21Apr 19, 2024Updated 2 years ago
- Repo for talk slides & materials☆21Nov 22, 2024Updated last year