Cyber Security Awareness Framework (CSAF)
☆101Feb 17, 2026Updated last month
Alternatives and similar repositories for csaf
Users that are interested in csaf are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆29Apr 3, 2025Updated 11 months ago
- ☆27Aug 18, 2023Updated 2 years ago
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆93Feb 20, 2026Updated last month
- Simple Latest CVE Collector Written in Python☆59Feb 29, 2024Updated 2 years ago
- ☆11May 13, 2024Updated last year
- Cisco SmartInstall Exploit [CVE-2018-0171]☆18Feb 6, 2023Updated 3 years ago
- String extraction and classification tool for binary files, designed to extract only the strings that can be considered relevant (i.e. no…☆11Aug 9, 2020Updated 5 years ago
- Yet Another Mac Changer!!!☆12Jan 26, 2023Updated 3 years ago
- CyATP: Cybersecurity Awareness Training Platform☆23Feb 15, 2022Updated 4 years ago
- PIP-INTEL is an OSINT (Open Source Intelligence) tool designed using various open-source tools and pip packages.☆193May 17, 2024Updated last year
- Red Team Server (RTS)☆16Mar 8, 2024Updated 2 years ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆52Feb 22, 2024Updated 2 years ago
- Simple Shellcode Runner in Rust Language☆18Dec 8, 2023Updated 2 years ago
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆124Dec 13, 2025Updated 3 months ago
- My latest setup configs.☆10Aug 7, 2016Updated 9 years ago
- Powershell script to help Speed up Threat hunting incident response processes☆43Feb 3, 2024Updated 2 years ago
- ☆13Mar 1, 2024Updated 2 years ago
- CVE-2021-21978 exp☆23Mar 5, 2021Updated 5 years ago
- Detect Program Bug Bounty☆42Jun 12, 2025Updated 9 months ago
- 渗透测试常规操作记录☆11Dec 11, 2020Updated 5 years ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆41Aug 31, 2023Updated 2 years ago
- ☆15Jan 29, 2021Updated 5 years ago
- Effortlessly browse and manage your files with ease using Tiny File Manager [WH1Z-Edition], a compact single-file PHP file manager.☆26Feb 13, 2024Updated 2 years ago
- A Slack bot phishing framework for Red Teaming exercises☆166Apr 27, 2024Updated last year
- A script to automate keystrokes through a graphical desktop program.☆34Jun 10, 2025Updated 9 months ago
- My-Course-Materials☆33Nov 29, 2023Updated 2 years ago
- A WLAN red team framework.☆157Feb 9, 2026Updated last month
- Kumpulan slide presentasi seminar, talk, workshop☆14Nov 11, 2025Updated 4 months ago
- https://medium.com/@anderson_pablo/iptv-smarters-exploit-cve-2020-9380-22d4b21f5da7☆13May 17, 2023Updated 2 years ago
- Live Feed of C2 servers, tools, and botnets☆756Mar 16, 2026Updated last week
- AWS Cloud Landscape Search Engine☆20Nov 29, 2023Updated 2 years ago
- ☆14Dec 6, 2023Updated 2 years ago
- Learning source code review, spot vulnerability, find some ways how to fix it.☆30Nov 17, 2022Updated 3 years ago
- Maltego Transforms for generating screenshots from Websites and URLs☆16Apr 24, 2023Updated 2 years ago
- Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating syste…☆178Jun 10, 2024Updated last year
- 📲 Apepe is a project developed to help to capture informations from a Android app through his APK file. It can be used to extract the co…☆140Oct 15, 2025Updated 5 months ago
- Indicator of Compromise Scanner for CVE-2019-19781☆58Mar 25, 2020Updated 5 years ago
- HTML parser for PEAS output with additional features☆137Feb 15, 2026Updated last month
- Minimalist notes for CEH-practical Cert.☆39Jul 19, 2022Updated 3 years ago