bin3xish477 / cybersecurityLinks
blue team, red team stuff. All things cyber ;)
☆79Updated 9 months ago
Alternatives and similar repositories for cybersecurity
Users that are interested in cybersecurity are comparing it to the libraries listed below
Sorting:
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆83Updated 5 years ago
- Various Cheat Sheets (e.g. Nmap, Metasploit, Common Ports, Subnetting, Wireshark, etc)☆53Updated 5 years ago
- Tracking my journey towards earning my OSCP. This includes the process of everything that I learn along the way.☆47Updated 4 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆97Updated 3 years ago
- This repository contains the PowerShell script for adding and removing the Sticky Key backdoor on Windows☆34Updated 5 years ago
- Reconnaissance and Enumeration automation script☆53Updated 4 years ago
- Contained is all my reference material for my OSCP / Red Teaming. Designed to be a one stop shop for code, guides, command syntax, and h…☆98Updated last week
- OWASP based Web Application Security Testing Checklist☆82Updated last year
- A set of recipes useful in pentesting and red teaming scenarios☆146Updated 2 years ago
- list of useful commands, shells and notes related to OSCP☆79Updated 7 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆33Updated 3 years ago
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆99Updated 2 years ago
- Attack Surface Discovery Tool☆110Updated last year
- ☆45Updated 4 years ago
- Red Team tools, infrastructure, and hardware weaponized☆109Updated last month
- ☆47Updated 8 years ago
- ☆36Updated 2 years ago
- Have you ever faced with the lack of possibility of using NMap? For instance if you have reverse shell as an unprivileged user and there …☆44Updated 2 years ago
- A detailed guide showing you different ways you can incorporate Python into your workflows around Nmap.☆152Updated 4 years ago
- Short checklists for penetration testing methodology☆200Updated 2 years ago
- List of red team resources☆100Updated 8 years ago
- Collaborative pentest tool with highly customizable tools☆73Updated 4 years ago
- Image Payload Creating/Injecting tools☆13Updated 4 years ago
- Cheat-Sheet of tools for penetration testing☆54Updated 2 years ago
- This contains a list of Blue Team Tools that I use daily, and have stored here for reference.☆34Updated 8 years ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆165Updated 5 months ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆119Updated last year
- A WLAN red team framework.☆155Updated 2 weeks ago
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆180Updated last year
- Subcert is a subdomain enumeration tool, that finds all the subdomains from certificate transparency logs.☆80Updated 4 years ago