A list of the best cybersecurity research related blogs.
☆33May 26, 2025Updated 9 months ago
Alternatives and similar repositories for Security-Research-Blogs
Users that are interested in Security-Research-Blogs are comparing it to the libraries listed below
Sorting:
- Common Security Interview Questions with Answers☆31Jul 4, 2023Updated 2 years ago
- https://academy.tcm-sec.com/☆14Aug 19, 2025Updated 6 months ago
- CriminalIP is a threat intelligence service that provides detailed information about IP addresses, domains, and other network elements.☆13Aug 20, 2024Updated last year
- 2D Level Editor written in Java☆10Oct 16, 2021Updated 4 years ago
- ☆22Nov 22, 2025Updated 3 months ago
- Digital Forensics and Incident Response notes and Autopsy tool walkthrough☆11Feb 3, 2022Updated 4 years ago
- This project is done to make the video on my YouTube channel : Learn Overflow☆11Oct 8, 2020Updated 5 years ago
- In this project, I developed a frontend web application, Car Rentals using Car Rentals API. You can book a car for you journeys anytime. …☆10Mar 31, 2023Updated 2 years ago
- Content Security Policy Generator, Powered by RapidSec☆16Feb 28, 2021Updated 5 years ago
- An AI-powered plugin for Caldera that orchestrates long-running LLM workflows to automatically create adversary emulation abilities and p…☆22Feb 2, 2026Updated last month
- ☆11Oct 15, 2024Updated last year
- ☆12Aug 5, 2023Updated 2 years ago
- Various scripts I create while doing CTFs. May or may not be helpful :)☆15Dec 14, 2024Updated last year
- Quickly setup your projects with this template.☆14Jan 5, 2024Updated 2 years ago
- Simple and small python service designed to generate and read Barcode, QRCode, Aztec Code, DataMatrix.☆13Feb 11, 2026Updated 3 weeks ago
- This repository provides insight on how to get started with Microsoft Security☆11Nov 27, 2025Updated 3 months ago
- A Malduino compatible USB Rubber Ducky payload to enable RDP, disable/cripple defender, disable AMSI, and execute a self healing and rebo…☆13Dec 14, 2020Updated 5 years ago
- morse encode and decode☆18Jan 8, 2023Updated 3 years ago
- ☆44Jan 14, 2026Updated last month
- ☆13Jan 19, 2023Updated 3 years ago
- Draw.io Iconset for Splunk☆17Aug 26, 2025Updated 6 months ago
- ☆28Nov 24, 2025Updated 3 months ago
- Wordlists compiled from Bible verses☆21May 12, 2022Updated 3 years ago
- A stealthy reverse shell built with native PowerShell and Server-Sent Events (SSE). No polling. No sockets. Just pure HTTP and real-time …☆22Apr 23, 2025Updated 10 months ago
- A simple bug bounty utility tool to remove uninteresting entries from a list of URLs.☆14Jul 22, 2024Updated last year
- Useful Alfred Snippets for Pentest☆18Dec 5, 2024Updated last year
- ☆16Aug 19, 2021Updated 4 years ago
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - CVE-2024-21413 POC☆16Feb 16, 2024Updated 2 years ago
- Proof-of-Concept for Authorization Bypass in Next.js Middleware☆19Mar 23, 2025Updated 11 months ago
- My Notes from Hugging Face AI Agents Course☆20Feb 18, 2025Updated last year
- A bot to quickly get information about an IP, useful to get threat intelligence informations for blue team.☆12Apr 14, 2025Updated 10 months ago
- Training and support materials for MSTICPy☆18Jun 27, 2023Updated 2 years ago
- General scripts that gather information out of Active Directory☆16Jun 9, 2022Updated 3 years ago
- Bash scripts to automate the burpsuite's certificate configuration and proxying of an Android device for penetration test.☆19May 26, 2025Updated 9 months ago
- A curated awesome list of lists of interview questions. Feel free to contribute!☆21Jul 24, 2024Updated last year
- Version 2 is live! Wordlists sorted by probability originally created for password generation and testing - make sure your passwords aren…☆20May 30, 2023Updated 2 years ago
- ☆39Nov 14, 2025Updated 3 months ago
- Used to check Github actions logs for secrets - specifically tj-actions and reviewdog☆22Mar 18, 2025Updated 11 months ago
- Easy automated vagrant provisioning of Windows 10 with flarevm tools installed for Digital Forensics and Malware Analysis Lab.☆20May 29, 2022Updated 3 years ago