blue team, red team stuff. All things cyber ;)
☆78May 8, 2025Updated last year
Alternatives and similar repositories for cybersecurity
Users that are interested in cybersecurity are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- BlackHat scrapy for download all the pdf file☆30Jun 7, 2024Updated last year
- My Markdown notes for all things cybersecurity☆183Aug 28, 2023Updated 2 years ago
- Forensic framework to build tools that can be reused in multiple projects without changing anything☆32Mar 19, 2026Updated 2 months ago
- Scripts and tools created for appx analysis talk (Magnet summit 2019)☆19Feb 26, 2024Updated 2 years ago
- Modified Nuclei Templates Version to FUZZ Host Header☆52Jan 11, 2022Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- another nmap summarising script☆26Oct 1, 2020Updated 5 years ago
- ☆14Feb 7, 2024Updated 2 years ago
- Some contributions in the nuclei-templates repository☆63Jun 18, 2022Updated 3 years ago
- A curated collection of courses, videos, and resources to master network security from the ground up.☆10Jan 6, 2025Updated last year
- Windows Forensics Salt States☆22May 14, 2026Updated last week
- Alias for storing ffuf results☆20May 23, 2020Updated 5 years ago
- Shared wordlists used for common subdomains , directory bruteforcing etc.☆10May 26, 2025Updated 11 months ago
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆17Jan 31, 2021Updated 5 years ago
- ☆33Jul 20, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆17Mar 11, 2024Updated 2 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆13Apr 6, 2024Updated 2 years ago
- ☆15Aug 16, 2022Updated 3 years ago
- Simple Automation script for juniper cve-2023-36845☆19Jan 30, 2024Updated 2 years ago
- ☆12Jul 2, 2023Updated 2 years ago
- Autopsy Module to analyze Registry Hives☆16Feb 18, 2022Updated 4 years ago
- ☆21Oct 9, 2017Updated 8 years ago
- Quick tool to create custom wordlists like how fuzzers work☆10Sep 29, 2023Updated 2 years ago
- Xss payload for bypassing waf☆18Apr 18, 2020Updated 6 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Hacked together script for feeding urls into Burp's Sitemap☆94Dec 7, 2025Updated 5 months ago
- Simple bash script to enumerate Linux machines☆13Nov 5, 2018Updated 7 years ago
- A collection of OSCE preparation resources.☆24Oct 30, 2019Updated 6 years ago
- ☆38Dec 10, 2023Updated 2 years ago
- ☆13May 12, 2019Updated 7 years ago
- meterpreter☆11Mar 31, 2018Updated 8 years ago
- Cool HackerOne Reports☆22Nov 16, 2022Updated 3 years ago
- Forensics Science Education☆11Apr 26, 2021Updated 5 years ago
- Blind XSS SVG☆10Mar 27, 2023Updated 3 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- dotfiles that can be installed by one command☆16May 14, 2026Updated last week
- Python script to give you subsets of the nmap "top-ports". For example, I want the 10th to 100th most common TCP ports. Spits out a comma…☆18Mar 8, 2020Updated 6 years ago
- This library provides functionality for fetching and parsing information about Common Vulnerabilities and Exposures (CVE) using the NIST …☆14May 11, 2023Updated 3 years ago
- ☆13Apr 23, 2018Updated 8 years ago
- A command-line tool for Cross-Site WebSocket Hijacking☆44Oct 18, 2023Updated 2 years ago
- A golang library designed to interact with Metasploit☆43Mar 27, 2021Updated 5 years ago
- SUB/PUSH/POP based ASCII shellcode encoder☆23Sep 7, 2017Updated 8 years ago