Cyber Security Foundations
☆35May 30, 2021Updated 4 years ago
Alternatives and similar repositories for Cyber-Security-Foundations
Users that are interested in Cyber-Security-Foundations are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A curated list of different pentesting resources☆30Feb 26, 2022Updated 4 years ago
- Install popular tools used while pentesting & playing labs☆14Oct 8, 2021Updated 4 years ago
- A Python based Recon Tool to search for Storage Buckets☆11Jan 21, 2023Updated 3 years ago
- Workflow for pentesting web applications.☆21Feb 19, 2019Updated 7 years ago
- A Collection of all things Security☆11Sep 24, 2020Updated 5 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Everything about xss protection technology☆14Oct 22, 2019Updated 6 years ago
- ☆12Apr 25, 2017Updated 8 years ago
- Small collection about free cybersecurity materials☆37Jul 25, 2021Updated 4 years ago
- My personal repository☆13Jan 18, 2026Updated 3 months ago
- Hack The Box CPTS command☆43Jun 25, 2025Updated 9 months ago
- This tool is a simple LFI, RFI, RCE, and Joomla Components vulnerability scanner, created by JayCyberSecurity☆22Apr 26, 2022Updated 3 years ago
- This repository is about Learn | Hack | Share | Repeat.☆11Dec 26, 2022Updated 3 years ago
- ☆11Oct 31, 2021Updated 4 years ago
- ☆12Feb 8, 2021Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- It grep subdomains, email/username, build custom wordlist etc from gau results☆50Nov 4, 2022Updated 3 years ago
- A simple place to learn XSS☆31Mar 20, 2021Updated 5 years ago
- Exactly what it sounds like, which is something rad☆22Oct 12, 2022Updated 3 years ago
- ☆18Feb 26, 2017Updated 9 years ago
- Bug Bounty & Other Stuff☆58Dec 16, 2021Updated 4 years ago
- Kali Linux Cheat Sheet for Penetration Testers☆14Jun 19, 2017Updated 8 years ago
- ☆72Oct 28, 2020Updated 5 years ago
- A simple CLI tool to check WebDAV vulnerability☆14Aug 13, 2021Updated 4 years ago
- Tutorials and Things to Do while Hunting Vulnerability.☆13Aug 30, 2022Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Wiki to collect Red Team infrastructure hardening resources☆19Jun 18, 2018Updated 7 years ago
- Project Morya is just a collection of bash scripts that runs iteratively to carry out various tools and recon process & store output in a…☆72Mar 5, 2022Updated 4 years ago
- ☆14Aug 16, 2021Updated 4 years ago
- This page should help you with the recon for security issues.☆20Oct 14, 2022Updated 3 years ago
- Hey Guys I released this tools just for helping you guys do recon. This tool contain many other open source tools which you need to setup…☆12Aug 23, 2021Updated 4 years ago
- Wordlists for Bug Bounty☆23Aug 18, 2019Updated 6 years ago
- Bug Bounty Tools☆34Jul 2, 2020Updated 5 years ago
- ☆57Oct 29, 2020Updated 5 years ago
- A powerful subdomain enumeration tool that aggregates data from multiple sources to create comprehensive lists of root subdomains.☆47Dec 19, 2025Updated 4 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆33Oct 12, 2022Updated 3 years ago
- ☆29Jul 5, 2023Updated 2 years ago
- My configs, tools and what not. For everytime that I blow up my vm....☆18Jan 21, 2020Updated 6 years ago
- Code for NDSS' 19 paper: A Systematic Framework to Generate Invariants for Anomaly Detection in Industrial Control Systems☆13Jun 21, 2021Updated 4 years ago
- Tools and scripts written for personal use☆12Jan 3, 2021Updated 5 years ago
- Fernbach is a vulnerable API written in the Flask micro web framework. The intent of this API is for testing the OWASP top ten vulnerabil…☆30Feb 4, 2022Updated 4 years ago
- Burp Extension to identify PII data☆21Jan 29, 2021Updated 5 years ago