☆75Dec 29, 2025Updated 2 months ago
Alternatives and similar repositories for Cybersecurity-Resources
Users that are interested in Cybersecurity-Resources are comparing it to the libraries listed below
Sorting:
- ☆16Jan 20, 2026Updated last month
- ☆11Dec 15, 2022Updated 3 years ago
- My Notes while studying for CompTIA Network+(N10-008) CompTIA Security+(SY0-601)☆50Dec 28, 2022Updated 3 years ago
- A list of universities with vulnerability disclosure policies☆13Jul 10, 2020Updated 5 years ago
- NavSec is the most comprehensive passive web vulnerability and privacy scanner. It performs real-time security analysis directly in your …☆23Sep 13, 2025Updated 5 months ago
- Password list generator in node js☆10May 8, 2024Updated last year
- privilege escalation by piggy-backing user sudo requests☆11Feb 6, 2023Updated 3 years ago
- Free Windows privilege escalation lab inspired by HTB Devel, built for PNPT and OSCP practice.☆23Jan 13, 2026Updated last month
- Brute force otp on has no rate limit☆13Aug 1, 2021Updated 4 years ago
- List of bug bounty programs of companies/organisations in Switzerland☆13Oct 28, 2021Updated 4 years ago
- Scripts for Pentesting☆13May 29, 2025Updated 9 months ago
- bash script to automate wardriving tasks. (Wi-Fi & Bluetooth)☆11Feb 14, 2023Updated 3 years ago
- checks various security features of a system, including firewall, intrusion detection system (IDS),Intrusion Prevention Systems (IPS), Ne…☆11Feb 21, 2023Updated 3 years ago
- RedirectHunter is a powerful open redirect vulnerability scanner that helps you quickly identify and mitigate potential security risks in…☆12Apr 21, 2023Updated 2 years ago
- This project documents my hands-on journey in learning and conducting internal Active Directory (AD) penetration testing. The exercises s…☆16Apr 19, 2025Updated 10 months ago
- A formula to calculate bounty amounts.☆15Dec 2, 2017Updated 8 years ago
- A PoC backdoor that uses Gmail as a C&C server☆13Jun 28, 2020Updated 5 years ago
- ☆30Sep 21, 2024Updated last year
- Remote persistent keylogger for Windows and Linux..☆12Aug 21, 2022Updated 3 years ago
- A Minimap mod for Lethal Company☆16Jun 6, 2025Updated 9 months ago
- Ruutu-lataaja☆14Feb 21, 2026Updated 2 weeks ago
- (Hacking-Tool), All tools in one!☆13Jul 5, 2021Updated 4 years ago
- This is a Simple reg Backdoor for Windows shell Hacking. You can fully compromise the target machine with this TOOL . For Advance backdoo…☆15Oct 26, 2020Updated 5 years ago
- ☆13May 20, 2023Updated 2 years ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆19May 29, 2023Updated 2 years ago
- sqlmap cheat sheet☆15Apr 6, 2023Updated 2 years ago
- ADKAVEH - One PowerShell script for Active Directory discovery and safe attack simulation.☆37Sep 28, 2025Updated 5 months ago
- This tool is designed for those situations during a pentest where you have upload access to a webserver that’s running PHP. Upload this …☆23Aug 6, 2024Updated last year
- Used to get NTLMv2 Hashes from SMB☆23Oct 24, 2024Updated last year
- A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference☆21Apr 14, 2021Updated 4 years ago
- Script to Exploit Buffer_overflow (0)-Day vulnerability & executes the command remotely on target system.☆15Nov 7, 2020Updated 5 years ago
- Internal Network Penetration Test Playbook☆17Apr 18, 2022Updated 3 years ago
- ☆13Apr 30, 2023Updated 2 years ago
- WPA Attack - Easy breaking WPA WPA2 networks by typing one command☆21Jun 15, 2015Updated 10 years ago
- XSS Fuzz Swiss Knife on any URI☆15Aug 3, 2019Updated 6 years ago
- This tool serves to add the kali linux repository to the ubuntu repository instantly. So that ubuntu users can install some of the tools …☆19Apr 16, 2022Updated 3 years ago
- Repository for my flipper zero badUSB payloads. Now almost entirely plug and play.☆25Jan 16, 2026Updated last month
- Does an action based on how many gifts you got☆44Jan 3, 2025Updated last year
- A study resource for the BSCP labs and exams.☆30Aug 8, 2025Updated 7 months ago