Discover and watch the latest cybersecurity conference talks. A curated archive of public security conference content.
☆282Apr 12, 2026Updated last week
Alternatives and similar repositories for awesome-cybersecurity-conferences
Users that are interested in awesome-cybersecurity-conferences are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- My cheatsheet notes to pentest AWS infrastructure☆704Oct 17, 2022Updated 3 years ago
- Periodic cyber security newsletters that capture the latest news, summaries of conference talks, research, best practices, tools, events,…☆1,294Apr 6, 2026Updated last week
- Python module for running BOFs☆79Nov 28, 2025Updated 4 months ago
- BlueHound - pinpoint the security issues that actually matter☆760Jul 12, 2023Updated 2 years ago
- A collection of real-world threat model examples across various technologies, providing practical insights into identifying and mitigatin…☆494Jun 12, 2025Updated 10 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆265Jul 5, 2025Updated 9 months ago
- A collection of various and sundry code snippets that leverage .NET dynamic tradecraft☆145May 18, 2024Updated last year
- Awesome information for WebSockets security research☆304Jan 10, 2022Updated 4 years ago
- View screenshots as a slideshow over http☆15Mar 13, 2020Updated 6 years ago
- Automating situational awareness for cloud penetration tests.☆2,340Apr 12, 2026Updated last week
- Collection of Beacon Object Files (BOF) for Cobalt Strike☆187Dec 5, 2022Updated 3 years ago
- ☆17Mar 6, 2023Updated 3 years ago
- ☆23Nov 13, 2021Updated 4 years ago
- ☆11Aug 31, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆86Jan 6, 2023Updated 3 years ago
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!☆1,944Oct 7, 2023Updated 2 years ago
- Mapping from bug bounty and vulnerability disclosure programs to respective GitHub organizations☆87Updated this week
- Living Off the Orchard: macOS Binaries (LOOBins) is designed to provide detailed information on various built-in "living off the land" ma…☆532Feb 25, 2026Updated last month
- ☆159Nov 26, 2023Updated 2 years ago
- stdin writes to slack☆13Feb 8, 2020Updated 6 years ago
- A GraphQL enumeration and extraction tool☆133Jan 29, 2023Updated 3 years ago
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆341Updated this week
- Azure mindmap for penetration tests☆229Nov 21, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Socks4 reverse proxy for penetration testing. Python 2 and 3 compatible.☆17Jul 1, 2022Updated 3 years ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- Finding all things on-prem Microsoft for password spraying and enumeration.☆257May 17, 2022Updated 3 years ago
- Simple PoC for demonstrating Race Conditions on Websockets☆54Sep 14, 2023Updated 2 years ago
- Extracts Azure authentication tokens from PowerShell process minidumps.☆25May 20, 2023Updated 2 years ago
- Complete Practical Study Plan to become a successful cybersecurity engineer based on roles like Pentest, AppSec, Cloud Security, DevSecOp…☆4,930Dec 31, 2025Updated 3 months ago
- Arsenal is just a quick inventory and launcher for hacking programs☆3,713Nov 29, 2024Updated last year
- Escalate your SSRF vulnerabilities on Modern Cloud Environments. `surf` allows you to filter a list of hosts, returning a list of viable …☆754Dec 19, 2023Updated 2 years ago
- Exploration project to invoke syscalls in arbitrary unix processes with ptrace.☆21Jun 14, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆142Jan 2, 2025Updated last year
- MCP Snitch is a macOS application that intercepts and monitors MCP server communications, providing security analysis, access control, an…☆93Oct 14, 2025Updated 6 months ago
- Electron-Probe leverages the Node variant of the Chrome Debugging Protocol to execute JavaScript payloads inside of target Electron appli…☆31Jan 13, 2026Updated 3 months ago
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆86Nov 8, 2023Updated 2 years ago
- ☆121Jun 17, 2022Updated 3 years ago
- Asset inventory of over 800 public bug bounty programs.☆1,536Feb 14, 2025Updated last year
- Production-ready detection & response queries for osquery☆603Apr 8, 2026Updated last week