chrisilson / free-cybersecurity-resourcesView external linksLinks
A curated list of free beginner resources for learning cybersecurity concepts
☆43Jul 19, 2025Updated 6 months ago
Alternatives and similar repositories for free-cybersecurity-resources
Users that are interested in free-cybersecurity-resources are comparing it to the libraries listed below
Sorting:
- Publicly-available tools from Rogue Valley Information Security☆14Feb 5, 2025Updated last year
- Setup scripts for HomeLab with Proxmox☆28Feb 5, 2026Updated last week
- Sometimes, threat feeds share critical information with certain details blurred, which is a good practice. However, CTI analysts still ne…☆12Sep 18, 2025Updated 4 months ago
- Generative AI-based CyberSecurity-focused Prompt Dataset for Benchmarking Large Language Models☆32Jan 14, 2025Updated last year
- Collection of videos of Raids on Cybercriminals☆21Mar 19, 2025Updated 10 months ago
- Terraform project to build AWS instances for pivot practice☆12May 15, 2023Updated 2 years ago
- Validation tool for SANS Courseware files. Generates and validates against a checksum file.☆22Updated this week
- An index of prompting libraries for GPTs, including ChatGPT. Some of these are on Github and others are hosted externally.☆38Nov 21, 2024Updated last year
- MCP Server for Ghidra☆18Jul 1, 2025Updated 7 months ago
- ☆51Nov 26, 2025Updated 2 months ago
- Parse a PowerPoint PPTX file, extracting all URL's from notes and slides, and test for validity☆28Apr 4, 2025Updated 10 months ago
- ☆25Feb 8, 2026Updated last week
- reveal origins behind reverse proxies & hidden services 👀 🧅 💻☆37Aug 23, 2025Updated 5 months ago
- A Checklist for Offsec PEN-200 EXAM OSCP+ 2024☆54Oct 31, 2024Updated last year
- Fast large file downloader over Tor☆36Jun 24, 2024Updated last year
- ☆83Nov 14, 2025Updated 3 months ago
- NotSoCereal: A Deserialization exploit playground☆54Jan 13, 2022Updated 4 years ago
- Create a MS Word index file from PowerPoint notes and slides☆46Sep 6, 2025Updated 5 months ago
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆58Sep 18, 2025Updated 4 months ago
- SANS Slingshot Linux Distribution☆56Nov 2, 2020Updated 5 years ago
- A repository of public reports, publications, and presentations associated with research performed by Security Engineers at Security In…☆52Jul 2, 2019Updated 6 years ago
- Email enumerator, username generator, and context validator for hunter.io, snov.io, and skrapp.io☆84Aug 5, 2024Updated last year
- OSINTinvestigation - Tecniche OSINT - Strumenti - DeepWeb - Archivio☆108Nov 7, 2025Updated 3 months ago
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆101Jan 12, 2024Updated 2 years ago
- Resources for SANS CTI Summit 2021 presentation☆104Nov 8, 2023Updated 2 years ago
- DeepFace UI is a web application for facial recognition and analysis built with DeepFace. It offers an intuitive interface to upload imag…☆138Mar 27, 2025Updated 10 months ago
- A collection of CVEs weaponized by ransomware operators☆129Oct 13, 2025Updated 4 months ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Oct 9, 2024Updated last year
- A tool for mapping cyber crime☆237Jan 24, 2026Updated 3 weeks ago
- "Evolving AppCompat/AmCache data analysis beyond grep"☆209Sep 15, 2021Updated 4 years ago
- A lightweight tool for scraping current and historic Google Analytics data☆232Aug 21, 2024Updated last year
- ☆286Aug 30, 2025Updated 5 months ago
- My curated list of resources for OSCP preperation☆261Nov 13, 2023Updated 2 years ago
- For all these times you're asking yourself "what is this panel again?"☆258Jan 29, 2026Updated 2 weeks ago
- Taxonomies used in MISP taxonomy system and can be used by other information sharing tool.☆295Jan 30, 2026Updated 2 weeks ago
- A list of useful Crypto resources for OSINT investigations☆342Mar 25, 2025Updated 10 months ago
- 🔎 OSINT Maltego Transforms for investigating Telegram channels, groups, and users, including deanonymization via stickers, forwarded mes…☆412Jan 27, 2026Updated 2 weeks ago
- Repository created to share information about tactics, techniques and procedures used by threat actors. Initially with ransomware groups …☆391Jan 29, 2026Updated 2 weeks ago
- This repository contains useful resources to conduct research and OSINT investigations on Discord accounts ,servers and bots.☆499Aug 8, 2024Updated last year