☆44Nov 27, 2023Updated 2 years ago
Alternatives and similar repositories for A-Good-Cyber-Security-List
Users that are interested in A-Good-Cyber-Security-List are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Links to VeteranSec Resources☆12May 18, 2020Updated 5 years ago
- Cobalt Strike DNS beacon parser☆11Nov 29, 2021Updated 4 years ago
- A simple vulnerable webapp created by PHP☆14Apr 18, 2025Updated 11 months ago
- ☆10Sep 30, 2020Updated 5 years ago
- Aggregated wordlist pulled from commonly used tools for discovery, enumeration, fuzzing, and exploitation.☆11Dec 30, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Metadefender Core (Metascan v.4 and v.3) analysis module for Viper malware analysis framework☆10Jan 6, 2021Updated 5 years ago
- Debian10-Linux4.19 Hook sys_call_table By IDT☆11May 9, 2020Updated 5 years ago
- Offensive Assembly code snippets.☆13Jul 12, 2023Updated 2 years ago
- A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if a user cred is valid, if MFA is enabled on the ac…☆19Apr 11, 2022Updated 3 years ago
- A low-cost remote vital signs monitor for home patients☆12Feb 19, 2026Updated last month
- Simple vulnerability labs that created using PHP and MySQL.☆16Dec 30, 2022Updated 3 years ago
- ☆24Sep 26, 2021Updated 4 years ago
- SonicWALL SSL-VPN Web Server Vulnerable Exploit☆48Jan 27, 2021Updated 5 years ago
- Windows CVE主防(HIPS/HIDS)☆58Apr 29, 2021Updated 4 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- The ultimate tool to crafting your ARM shell code☆10Aug 7, 2015Updated 10 years ago
- Enumerate the DLLs/Modules using NtQueryVirtualMemory☆32Jun 11, 2015Updated 10 years ago
- Example of Kerberoasting Honeypot☆18Sep 11, 2025Updated 6 months ago
- ☆18Feb 9, 2021Updated 5 years ago
- I'll post some malware analysis from time to time.☆24Apr 3, 2021Updated 4 years ago
- This module helps you get started with basic Zigbee analysis, and later on performing additional attacks on the Zigbee protocol.☆13Nov 23, 2016Updated 9 years ago
- A collection of awesome software, learning tutorials, theoretical resources, books and videos, best practices in applied cryptography.☆12Feb 4, 2022Updated 4 years ago
- Malware sample exchange system and API intended for Anti-Virus companies and researchers.☆16Aug 19, 2024Updated last year
- Sporta is a dynamic app designed for sports enthusiasts who want to connect 🤝, compete 🏆, and play 🏀🎾⚽ with others.☆10Apr 24, 2025Updated 11 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Pythonic interface to the Internet Storm Center / DShield API.☆29May 23, 2023Updated 2 years ago
- An ongoing collection of Go tools and frameworks, software, libraries, learning tutorials, frameworks, academic and practical resources.☆25Mar 20, 2022Updated 4 years ago
- ☆14Dec 22, 2015Updated 10 years ago
- Source code RDPUploader☆19Dec 27, 2018Updated 7 years ago
- ☆15Apr 10, 2025Updated 11 months ago
- Jawaban pemrograman C dan C++ https://tlx.toki.id/☆17Jun 27, 2020Updated 5 years ago
- Cobalt Strike (CS) Beacon Object File (BOF) foundation for kernel exploitation using CVE-2021-21551.☆30Jun 7, 2023Updated 2 years ago
- A collection of open source threat detection rules created by Cyber Castle's team.☆14Jun 2, 2022Updated 3 years ago
- Import DynamoRIO drcov code coverage data into Ghidra☆44Dec 21, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆22Jul 27, 2020Updated 5 years ago
- Python code to use different APIs which can help in your OSINT efforts☆27Apr 16, 2024Updated last year
- Damned Vulnerable Windows Application☆14Jul 10, 2019Updated 6 years ago
- ☆14Mar 28, 2018Updated 7 years ago
- ☆14Jan 5, 2021Updated 5 years ago
- F5 BIG-IP iControl REST vulnerability RCE exploit with Java including a testing LAB☆12May 11, 2023Updated 2 years ago
- Resource links (video, slides & code) for my conference talks | presentations | workshops☆21Nov 17, 2025Updated 4 months ago