This is an aspiring project aimed at accumulating knowledge from the world of cybersecurity and presenting it in a cogent way, so it is accessible to as large an audience as possible and so that everyone has a good resource to learn hacking from.
☆200Aug 6, 2024Updated last year
Alternatives and similar repositories for cyberclopaedia
Users that are interested in cyberclopaedia are comparing it to the libraries listed below
Sorting:
- Repositorio con recursos de valor para los participantes de la 3ra edición del Programa de Fundamentos de Ciberseguridad (2022).☆13Apr 16, 2022Updated 3 years ago
- A collection of Script for Red Team & Incidence Response☆11Jun 30, 2022Updated 3 years ago
- Various scripts I've built for CTFs, hacking challenges, and for learning how various existing tools work☆17Mar 21, 2023Updated 3 years ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Mar 21, 2023Updated 3 years ago
- ☆11Dec 22, 2022Updated 3 years ago
- A Docker container used to easily compile Nim binaries generated by my tools (NimPackt and NimPlant)☆16Aug 31, 2023Updated 2 years ago
- Educational repository with source code examples☆12Jun 3, 2025Updated 9 months ago
- MDPin is a server and a website. It contains an UI to fake a Android login screen to steal their pin code. It works via a web browser, by…☆43Mar 9, 2021Updated 5 years ago
- Bibi-Bird is a SQL Injection Automation tool.☆37Feb 20, 2026Updated last month
- ☆12Sep 10, 2022Updated 3 years ago
- Learn how to be a hacker☆11Aug 29, 2023Updated 2 years ago
- ☆10May 25, 2023Updated 2 years ago
- Hackaton - El Poder de la Nube☆12Dec 11, 2022Updated 3 years ago
- The FOSS-Cloud webinterface.☆14Aug 25, 2017Updated 8 years ago
- A simple Node.js Express REST app with some OWASP vulnerabilities.☆22Aug 13, 2024Updated last year
- NmapPy - Python implementation of Nmap☆35Nov 27, 2018Updated 7 years ago
- IP/FQDN data structure helper with randomization of hosts and ports based on masscan internal logic☆68Jul 7, 2024Updated last year
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆13Apr 30, 2021Updated 4 years ago
- VS Code extension for automatically starting workspace related docker containers☆17Mar 5, 2023Updated 3 years ago
- Single Python Project enabling quick infrastructure loading (SMB Servers, HTTP File Server, FTP, Webpage, NetScanner)☆13Jan 15, 2024Updated 2 years ago
- i3 for kali-linux 1 shot setup configs included☆11Sep 1, 2023Updated 2 years ago
- Browser extension for launching multi-platform OSINT queries from grouped YAML profiles.☆10Apr 25, 2025Updated 10 months ago
- Music downloader from youtube with only two clicks☆20Jan 5, 2023Updated 3 years ago
- Automated pentest reporting with custom templates, project tracking, customer dashboard and client management tools. Streamline your secu…☆1,065Feb 3, 2026Updated last month
- This Tool is a GUI based phishing tool, In which you can phish without giving any cmd's on terminal. It works on all plateforms.☆13Sep 28, 2024Updated last year
- KeyTerms centralized terminology management tool☆13Feb 7, 2019Updated 7 years ago
- Python-based Disinformation and Deception bot for Twitter with OPSEC in mind.☆48Aug 1, 2020Updated 5 years ago
- FRAVIA: The Art of Searching☆58May 6, 2024Updated last year
- Measurement system I built during my PhD to collect and analyse large-scale datasets; including phishing and malware attacks on Twitter, …☆16Jun 25, 2021Updated 4 years ago
- This guide details the planning and the tools involved in creating a secure Linux production systems - work in progress.☆19Feb 1, 2019Updated 7 years ago
- A tool that removes traces of executed applications on Windows OS.☆122Sep 4, 2022Updated 3 years ago
- VLAN attacks toolkit☆12Sep 1, 2022Updated 3 years ago
- Cheatsheet from the PJPT course of TCM security.☆33Jan 15, 2024Updated 2 years ago
- Automated Linux service that collects information on local Wi-Fi networks and performs deauthentication attacks.☆68Mar 4, 2023Updated 3 years ago
- Quick Command Cheatsheet, you can import/open directly to you ONE NOTE.☆10Updated this week
- 🎯 Chrome Extension - Passive scanner for Dependency Confusion vulnerabilities in npm/PyPI packages☆26Jan 31, 2026Updated last month
- H&E- Burp Highlighter and Extractor☆18Mar 29, 2023Updated 2 years ago
- CTF and Bug Bounty Hunting WriteUps.☆21Feb 20, 2026Updated last month
- XSSMaze is a web service designed to test and improve the performance of security testing tools by providing various cases of XSS vulnera…☆31Mar 8, 2026Updated last week