XpI0It / 3xploitLinks
Educational Cybersecurity Gaming Experience
☆10Updated 3 years ago
Alternatives and similar repositories for 3xploit
Users that are interested in 3xploit are comparing it to the libraries listed below
Sorting:
- Red Team Operations Framework☆22Updated last year
- Ransomware for demonstration☆18Updated 2 years ago
- Open Source Intelligence (OSINT) Tool List for Cyber Threat Intelligence Researchers☆22Updated last year
- Offensive Security Vault structure for Obsidian☆23Updated 2 years ago
- A collection of awesome tools, software, libraries, learning tutorials & videos, frameworks, best practices and technical resources abou…☆58Updated 2 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆31Updated last year
- A toolkit for your red team operations☆33Updated 4 years ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆39Updated 2 years ago
- New Framework Red Team Operations☆19Updated 4 years ago
- A list of awesome penetration testing tools and resources.☆82Updated 2 years ago
- ☆24Updated 2 years ago
- MS Graph Commands and Tools for Blue Teamers☆52Updated 2 years ago
- A SOC Analyst's tool to automate the investigation & validation of possible Indicators of Compromise (IOCs) and perform various tasks inc…☆28Updated 3 years ago
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆37Updated last year
- ☆78Updated last year
- List of sources for cybersecurity news☆40Updated 3 years ago
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆34Updated last year
- A network logging tool that logs per process activities☆32Updated 2 years ago
- Daily updates from leaked data search engines, aggregators and similar services.☆129Updated last week
- ☆34Updated 2 years ago
- OSINT mapping using Twitter, Ficklr, Shodan and Insecam☆23Updated 2 years ago
- ☆14Updated last year
- Security audit script decreases info gathering from average of 5 minutes, to 20 seconds, and returns everything into a textfile.☆11Updated last year
- ☆19Updated 3 years ago
- Perform file-based malware scan on your on-prem servers with AWS☆13Updated 2 years ago
- this is a small script for extracting questions from try hack me room ,and creating a MD file☆12Updated 2 years ago
- Jupyter Notebooks for the Blue Team☆39Updated 11 months ago
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆35Updated 2 years ago
- A collection of Malware Analysis software, materials, libraries, documents, books, resources about malware analysis in Cybersecurity.☆56Updated 2 years ago
- Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152☆21Updated 2 years ago