XpI0It / 3xploitLinks
Educational Cybersecurity Gaming Experience
☆10Updated 2 years ago
Alternatives and similar repositories for 3xploit
Users that are interested in 3xploit are comparing it to the libraries listed below
Sorting:
- Ransomware for demonstration☆18Updated 2 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated last year
- Red Team Operations Framework☆21Updated last year
- A toolkit for your red team operations☆28Updated 3 years ago
- Security audit script decreases info gathering from average of 5 minutes, to 20 seconds, and returns everything into a textfile.☆11Updated last year
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆40Updated 2 years ago
- Field guide to gather low-hanging fruits☆13Updated 6 months ago
- A public repository of MITRE ATT&ACK TTP mappings by BushidoUK for OSINT reports that lack a section breaking down the TTPs.☆26Updated 6 months ago
- Comprehensive adversary emulation tool for security testing on Google Cloud Platform (GCP) environments.☆14Updated last year
- A learning and testing environment for web application hacking and pentesting.☆27Updated 4 years ago
- ☆18Updated 3 years ago
- ☆78Updated last year
- ☆13Updated last year
- A not-curated list of cloud hacking labs☆27Updated last year
- This script is to build Wazuh 4.3 environment☆11Updated 3 years ago
- A collection of awesome tools, software, libraries, learning tutorials & videos, frameworks, best practices and technical resources abou…☆57Updated 2 years ago
- An experimental Velociraptor implementation using cloud infrastructure☆26Updated this week
- ☆38Updated 8 months ago
- Simple Shellcode Runner in Rust Language☆17Updated last year
- ARP Spoofing Defender is a project designed to protect local networks from ARP Spoofing attacks. ARP Spoofing Defender provides mechanism…☆20Updated 10 months ago
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆37Updated last year
- List of sources for cybersecurity news☆39Updated 2 years ago
- GRC (Governance, Risk and Compliance) Software, to manage risks and controls. It is based in best practices and helps organizations to ma…☆20Updated 2 years ago
- ☆22Updated 2 years ago
- this is a small script for extracting questions from try hack me room ,and creating a MD file☆12Updated 2 years ago
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆50Updated 3 years ago
- Open Source Intelligence (OSINT) Tool List for Cyber Threat Intelligence Researchers☆23Updated last year
- New Framework Red Team Operations☆18Updated 4 years ago
- ☆18Updated 11 months ago
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆34Updated last year