daniellowrie / Security-Research-BlogsView external linksLinks
A list of the best cybersecurity research related blogs.
☆33May 26, 2025Updated 8 months ago
Alternatives and similar repositories for Security-Research-Blogs
Users that are interested in Security-Research-Blogs are comparing it to the libraries listed below
Sorting:
- CriminalIP is a threat intelligence service that provides detailed information about IP addresses, domains, and other network elements.☆13Aug 20, 2024Updated last year
- Content Security Policy Generator, Powered by RapidSec☆16Feb 28, 2021Updated 4 years ago
- Digital Forensics and Incident Response notes and Autopsy tool walkthrough☆11Feb 3, 2022Updated 4 years ago
- An AI-powered plugin for Caldera that orchestrates long-running LLM workflows to automatically create adversary emulation abilities and p…☆21Feb 2, 2026Updated last week
- ☆11Oct 15, 2024Updated last year
- Automate Checkmarx Scanning and Onboarding Plus AWS Access☆12Jan 5, 2023Updated 3 years ago
- This project is done to make the video on my YouTube channel : Learn Overflow☆11Oct 8, 2020Updated 5 years ago
- ☆36Jan 14, 2026Updated last month
- Various scripts I create while doing CTFs. May or may not be helpful :)☆15Dec 14, 2024Updated last year
- ☆12Aug 5, 2023Updated 2 years ago
- Identify technology on websites.☆15Aug 11, 2022Updated 3 years ago
- Simple and small python service designed to generate and read Barcode, QRCode, Aztec Code, DataMatrix.☆13Jan 27, 2026Updated 2 weeks ago
- morse encode and decode☆18Jan 8, 2023Updated 3 years ago
- ☆13Jan 19, 2023Updated 3 years ago
- Quickly setup your projects with this template.☆14Jan 5, 2024Updated 2 years ago
- Draw.io Iconset for Splunk☆17Aug 26, 2025Updated 5 months ago
- ☆27Nov 24, 2025Updated 2 months ago
- Wordlists compiled from Bible verses☆21May 12, 2022Updated 3 years ago
- A curated awesome list of lists of interview questions. Feel free to contribute!☆19Jul 24, 2024Updated last year
- A simple bug bounty utility tool to remove uninteresting entries from a list of URLs.☆14Jul 22, 2024Updated last year
- Useful Alfred Snippets for Pentest☆18Dec 5, 2024Updated last year
- Proof-of-Concept for Authorization Bypass in Next.js Middleware☆19Mar 23, 2025Updated 10 months ago
- ☆16Aug 19, 2021Updated 4 years ago
- A bot to quickly get information about an IP, useful to get threat intelligence informations for blue team.☆12Apr 14, 2025Updated 10 months ago
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - CVE-2024-21413 POC☆16Feb 16, 2024Updated last year
- Training and support materials for MSTICPy☆18Jun 27, 2023Updated 2 years ago
- Pentesting APIs, Published by Packt☆17Aug 20, 2024Updated last year
- A stealthy reverse shell built with native PowerShell and Server-Sent Events (SSE). No polling. No sockets. Just pure HTTP and real-time …☆22Apr 23, 2025Updated 9 months ago
- ☆37Nov 14, 2025Updated 3 months ago
- ☆17Jan 21, 2026Updated 3 weeks ago
- Ethical Hacking techniques☆26Mar 30, 2025Updated 10 months ago
- ☆17May 6, 2021Updated 4 years ago
- This repository contains a fork from "language-models-trajectory-generators", the goal is to test the same functionality with Mistrals LL…☆21Oct 7, 2024Updated last year
- Control your computer via a text file. I recommend a command from IFTTT to update the text file.☆14Jun 22, 2020Updated 5 years ago
- Stack based buffer overflows attacks made simple. BufferSploit is a semi automated CLI based tool for performing stack based buffer overf…☆20Feb 15, 2021Updated 5 years ago
- WifiForge is a tool developed by Black Hills InfoSec to help train Pentesters on different Wi-Fi attack vectors and Wireless capabilities…☆429Jan 15, 2026Updated last month
- ☆30Dec 3, 2025Updated 2 months ago
- Simple Nmap XML parsing script. Doesn't do anything fancy☆21Oct 22, 2020Updated 5 years ago
- ☆17May 28, 2022Updated 3 years ago