XpI0It / 3xploitLinks
Educational Cybersecurity Gaming Experience
☆10Updated 2 years ago
Alternatives and similar repositories for 3xploit
Users that are interested in 3xploit are comparing it to the libraries listed below
Sorting:
- Ransomware for demonstration☆18Updated 2 years ago
- Red Team Operations Framework☆20Updated last year
- Comprehensive adversary emulation tool for security testing on Google Cloud Platform (GCP) environments.☆14Updated last year
- A toolkit for your red team operations☆27Updated 3 years ago
- New Framework Red Team Operations☆18Updated 4 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated last year
- A network logging tool that logs per process activities☆32Updated 2 years ago
- OSINT mapping using Twitter, Ficklr, Shodan and Insecam☆22Updated 2 years ago
- Open Source Intelligence (OSINT) Tool List for Cyber Threat Intelligence Researchers☆22Updated last year
- This repository contains a comprehensive testing designed for evaluating the performance and resilience of Endpoint Detection and Respons…☆57Updated 10 months ago
- Red Team tools, infrastructure, and hardware weaponized☆107Updated 2 months ago
- SSH brute-force script created for HackTheBox☆17Updated 5 years ago
- ☆18Updated 3 years ago
- This project is a tool for detecting nudity in images, allowing users to analyze both local images and images from URLs. It utilizes the …☆15Updated 11 months ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆40Updated 2 years ago
- List of sources for cybersecurity news☆37Updated 2 years ago
- ☆78Updated last year
- A collection of awesome tools, software, libraries, learning tutorials & videos, frameworks, best practices and technical resources abou…☆56Updated 2 years ago
- The Kill-The-Code Python Program provides a robust mechanism for remotely controlling code execution by monitoring a specified URL for a …☆17Updated last year
- AWS Security Tool☆30Updated last year
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆34Updated last year
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environments☆13Updated last year
- ☆31Updated 4 years ago
- ☆26Updated 2 months ago
- A public repository of MITRE ATT&ACK TTP mappings by BushidoUK for OSINT reports that lack a section breaking down the TTPs.☆26Updated 5 months ago
- A collection of awesome framework, libraries, learning tutorials, videos, webcasts, technical resources and cool stuff about Social Engin…☆19Updated 3 years ago
- web application pentesting tools for docker☆18Updated 3 years ago
- A multi-cloud DNS record scanner that aims to help cybersecurity/IT analysts identify dangling CNAME records in their cloud DNS services …☆50Updated 2 years ago
- A not-curated list of cloud hacking labs☆25Updated last year
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Support☆34Updated last year