☆86Dec 29, 2025Updated 4 months ago
Alternatives and similar repositories for Cybersecurity-Resources
Users that are interested in Cybersecurity-Resources are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Comprehensive pfSense deployment, monitoring, and security knowledge base: From basic configuration to advanced SIEM infrastructure, IDS/…☆26Mar 29, 2026Updated last month
- Contains aggregated lists and information on cybersecurity topics☆39Mar 21, 2025Updated last year
- Open source cyber-serenity platform that help the security teams designing and managing companies' ISMS, and which allow them to create r…☆19Apr 27, 2026Updated last week
- A list of universities with vulnerability disclosure policies☆13Jul 10, 2020Updated 5 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆17Jul 5, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- My Notes while studying for CompTIA Network+(N10-008) CompTIA Security+(SY0-601)☆50Dec 28, 2022Updated 3 years ago
- A formula to calculate bounty amounts.☆15Dec 2, 2017Updated 8 years ago
- collection of materials and resources I use to teach computer security classes☆12Jun 25, 2021Updated 4 years ago
- A PoC backdoor that uses Gmail as a C&C server☆13Jun 28, 2020Updated 5 years ago
- Build security program documentation using Git and Markdown☆28Jan 26, 2026Updated 3 months ago
- Archive of the Information Secuity policy documentation for Greater Manchester CHC that conforms to ISO27001☆14Apr 19, 2020Updated 6 years ago
- RedirectHunter is a powerful open redirect vulnerability scanner that helps you quickly identify and mitigate potential security risks in…☆13Apr 21, 2023Updated 3 years ago
- Working reverse-engineered Claude Code CLI rebuilt from source analysis to reproduce the original terminal workflow☆106Apr 18, 2026Updated 3 weeks ago
- ☆27Apr 1, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- 🎯 SQL Injection Payload List☆10Jun 6, 2021Updated 4 years ago
- Internal Network Penetration Test Playbook☆17Apr 18, 2022Updated 4 years ago
- sqlmap cheat sheet☆15Apr 6, 2023Updated 3 years ago
- Brute force otp on has no rate limit☆13Aug 1, 2021Updated 4 years ago
- A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference☆21Apr 14, 2021Updated 5 years ago
- ☆19Apr 8, 2023Updated 3 years ago
- Learning resources for cybersecurity including youtube, github, books, videos, courses, labs, articles etc. at one place☆86Apr 23, 2026Updated 2 weeks ago
- Beginner Road map that paves the way for your journey into the captivating world of cyber security based on job roles.☆25Jan 27, 2024Updated 2 years ago
- An open source Governance Risk Compliance (GRC) solution for corporates and government☆38Jul 10, 2017Updated 8 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- On this page you will find links to, tools, for researching companies. The list is primarily focused towards the UK.☆39Dec 31, 2025Updated 4 months ago
- This repository is a comprehensive collection of resources, documentation, apps, and add-ons related to Splunk, a powerful data analytics…☆26Updated this week
- ☆32Apr 30, 2026Updated last week
- This is a Python script that generates a staged payload that fully bypasses MS Defender. Can potentially be used for EDRs with some custo…☆77Mar 31, 2026Updated last month
- ☆10Jan 5, 2020Updated 6 years ago
- HHousen's writeups to various HackTheBox machines and challenges from https://hackthebox.com.☆22Mar 3, 2023Updated 3 years ago
- ☆31Dec 11, 2025Updated 4 months ago
- Dec 28th @ in5 - Introduction to Ethical Hacking and Cyber Security. At this session, we went over the basics of cybersecurity and showe…☆46Dec 29, 2019Updated 6 years ago
- NekRos is an Open-Source Ransomeware, with advanced Features, Which Looks Like Wannacry and Has C&C Server which can be Used to Retrive K…☆13Jan 10, 2021Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆11Aug 18, 2023Updated 2 years ago
- checks various security features of a system, including firewall, intrusion detection system (IDS),Intrusion Prevention Systems (IPS), Ne…☆11Feb 21, 2023Updated 3 years ago
- WPA Attack - Easy breaking WPA WPA2 networks by typing one command☆21Jun 15, 2015Updated 10 years ago
- IP Tracking☆10Jul 1, 2019Updated 6 years ago
- Tracking my progress for 100 days learning something new daily....☆22May 7, 2023Updated 3 years ago
- Official payload library for the O.MG line of products from Mischief Gadgets☆10Aug 22, 2023Updated 2 years ago
- Password list generator in node js☆10May 8, 2024Updated 2 years ago