bin3xish477 / cybersecurityLinks
blue team, red team stuff. All things cyber ;)
☆78Updated 5 months ago
Alternatives and similar repositories for cybersecurity
Users that are interested in cybersecurity are comparing it to the libraries listed below
Sorting:
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆81Updated 4 years ago
- Tracking my journey towards earning my OSCP. This includes the process of everything that I learn along the way.☆47Updated 3 years ago
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆97Updated 2 years ago
- OWASP based Web Application Security Testing Checklist☆78Updated last year
- Reconnaissance and Enumeration automation script☆53Updated 4 years ago
- MayorSec DNS Enumeration Tool☆88Updated 10 months ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆96Updated 2 years ago
- A set of recipes useful in pentesting and red teaming scenarios☆144Updated 2 years ago
- Red Team tools, infrastructure, and hardware weaponized☆107Updated last week
- Have you ever faced with the lack of possibility of using NMap? For instance if you have reverse shell as an unprivileged user and there …☆43Updated 2 years ago
- ☆45Updated 4 years ago
- Short checklists for penetration testing methodology☆194Updated 2 years ago
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆181Updated last year
- Various Cheat Sheets (e.g. Nmap, Metasploit, Common Ports, Subnetting, Wireshark, etc)☆52Updated 5 years ago
- Attack Surface Discovery Tool☆110Updated last year
- list of useful commands, shells and notes related to OSCP☆80Updated 7 years ago
- Notes from various sources for preparing to take the OSCP, Capture the Flag challenges, and Hack the Box machines.☆84Updated 2 months ago
- An in-depth guide to help people who are new to penetration testing or red teaming and are looking to gain an overview of the penetration…☆145Updated 9 months ago
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆44Updated 2 years ago
- List of red team resources☆96Updated 7 years ago
- Collaborative pentest tool with highly customizable tools☆75Updated 3 years ago
- A detailed guide showing you different ways you can incorporate Python into your workflows around Nmap.☆150Updated 3 years ago
- Image Payload Creating/Injecting tools☆13Updated 4 years ago
- A WLAN red team framework.☆155Updated last year
- Slides for my conference talks☆44Updated 2 years ago
- Web application with vulnerabilities found in real cases, both in pentests and in Bug Bounty programs.☆166Updated last year
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆164Updated 2 months ago
- To help you go through the pentesting phases and the tools each phase can have. Some pratical examples of the tools are present too.☆47Updated 6 years ago
- ☆75Updated 4 years ago
- Active Directory Cheat Sheet☆143Updated 4 years ago