Striving-to-learn / Cybersecurity-ResourcesView external linksLinks
☆67Dec 29, 2025Updated last month
Alternatives and similar repositories for Cybersecurity-Resources
Users that are interested in Cybersecurity-Resources are comparing it to the libraries listed below
Sorting:
- A Node.js and Express.js backend template tailored for beginner developers. It offers a structured foundation, essential tools, and best …☆14Aug 18, 2024Updated last year
- ☆11Dec 15, 2022Updated 3 years ago
- C++ implementation of Householder QR Factorization☆11Apr 1, 2022Updated 3 years ago
- The Tool will fetch the article links for you, based on your query. Enter anything you want to search, whether a vulnerability descriptio…☆10Jan 2, 2021Updated 5 years ago
- Analysis and Creation of Wordlists with Complex Passwords for Password Cracking☆10Jul 31, 2023Updated 2 years ago
- Infect Android Phone☆10Jun 21, 2023Updated 2 years ago
- A list of universities with vulnerability disclosure policies☆13Jul 10, 2020Updated 5 years ago
- NavSec is the most comprehensive passive web vulnerability and privacy scanner. It performs real-time security analysis directly in your …☆23Sep 13, 2025Updated 5 months ago
- privilege escalation by piggy-backing user sudo requests☆11Feb 6, 2023Updated 3 years ago
- Official payload library for the O.MG line of products from Mischief Gadgets☆10Aug 22, 2023Updated 2 years ago
- List of bug bounty programs of companies/organisations in Switzerland☆13Oct 28, 2021Updated 4 years ago
- checks various security features of a system, including firewall, intrusion detection system (IDS),Intrusion Prevention Systems (IPS), Ne…☆10Feb 21, 2023Updated 2 years ago
- Scripts for Pentesting☆13May 29, 2025Updated 8 months ago
- NekRos is an Open-Source Ransomeware, with advanced Features, Which Looks Like Wannacry and Has C&C Server which can be Used to Retrive K…☆13Jan 10, 2021Updated 5 years ago
- Free Windows privilege escalation lab inspired by HTB Devel, built for PNPT and OSCP practice.☆23Jan 13, 2026Updated last month
- bash script to automate wardriving tasks. (Wi-Fi & Bluetooth)☆10Feb 14, 2023Updated 3 years ago
- RedirectHunter is a powerful open redirect vulnerability scanner that helps you quickly identify and mitigate potential security risks in…☆11Apr 21, 2023Updated 2 years ago
- ROS2 driver pkg for wheeltec N100 IMU module.☆14Jun 7, 2023Updated 2 years ago
- ☆24Sep 21, 2024Updated last year
- Remote persistent keylogger for Windows and Linux..☆12Aug 21, 2022Updated 3 years ago
- A Minimap mod for Lethal Company☆15Jun 6, 2025Updated 8 months ago
- A PoC backdoor that uses Gmail as a C&C server☆13Jun 28, 2020Updated 5 years ago
- A formula to calculate bounty amounts.☆15Dec 2, 2017Updated 8 years ago
- This project documents my hands-on journey in learning and conducting internal Active Directory (AD) penetration testing. The exercises s…☆16Apr 19, 2025Updated 9 months ago
- WEB SQLi Injection DB Dumper DATA Hacking Tool☆12Oct 1, 2019Updated 6 years ago
- 🎯 SQL Injection Payload List☆10Jun 6, 2021Updated 4 years ago
- ☆13May 20, 2023Updated 2 years ago
- (Hacking-Tool), All tools in one!☆13Jul 5, 2021Updated 4 years ago
- The following repo holds all scripts, apps, and documentation for InfoSec Red Team related activities.☆19Jun 24, 2020Updated 5 years ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆19May 29, 2023Updated 2 years ago
- Ruutu-lataaja☆14Mar 20, 2024Updated last year
- This is a Simple reg Backdoor for Windows shell Hacking. You can fully compromise the target machine with this TOOL . For Advance backdoo…☆15Oct 26, 2020Updated 5 years ago
- Machine Learning resources for everyone.☆15Nov 24, 2022Updated 3 years ago
- Script to Exploit Buffer_overflow (0)-Day vulnerability & executes the command remotely on target system.☆15Nov 7, 2020Updated 5 years ago
- Hack Windows with FUD backdoor/payload, Escalates LINUX privileges, Devastate Linux, Tunnel forwarding☆15Nov 10, 2020Updated 5 years ago
- This tool is designed for those situations during a pentest where you have upload access to a webserver that’s running PHP. Upload this …☆22Aug 6, 2024Updated last year
- ADKAVEH - One PowerShell script for Active Directory discovery and safe attack simulation.☆37Sep 28, 2025Updated 4 months ago
- WPA Attack - Easy breaking WPA WPA2 networks by typing one command☆21Jun 15, 2015Updated 10 years ago
- A study resource for the BSCP labs and exams.☆27Aug 8, 2025Updated 6 months ago