Collection of advice to new IT security folks
☆18Oct 25, 2018Updated 7 years ago
Alternatives and similar repositories for SecurityAdvice
Users that are interested in SecurityAdvice are comparing it to the libraries listed below
Sorting:
- First edition of the annual beginner CTF by havce.☆13Dec 18, 2022Updated 3 years ago
- ☆44Oct 20, 2017Updated 8 years ago
- A basic NodeJS/ExpressJS app that uses 2FA with both Google TOTP and Fido U2F☆10Dec 4, 2020Updated 5 years ago
- Jekyll template for presentations with reveal.js☆28Oct 18, 2014Updated 11 years ago
- Baseline organizational policies and practices☆10Apr 17, 2017Updated 8 years ago
- A self-hosted, real-time collaborative workspace for offensive security assessments.☆41Feb 20, 2026Updated last month
- simple webapp for converting sigma rules into siem queries using the pySigma library☆50Sep 1, 2023Updated 2 years ago
- A collection of captured SSH login credentials☆17Mar 28, 2021Updated 4 years ago
- Automatically parse LTE-Pcap-files (Wireshark) and show the position of the eNodeB (BaseStation) on a map. The project uses the API of op…☆10May 16, 2017Updated 8 years ago
- Elastic Security Labs' malware analysis and reverse engineering library☆52Mar 10, 2026Updated last week
- Password Guessing for different Web Portals☆29Nov 14, 2018Updated 7 years ago
- A collection of writeups for active HTB boxes.☆11Nov 15, 2018Updated 7 years ago
- Attempts to brute force the password of a zip file☆10May 31, 2016Updated 9 years ago
- A script to automate Jenkins credential store decryption☆17May 29, 2018Updated 7 years ago
- Renders possibly unsafe PDF files and outputs harmless PDF files☆26Jan 6, 2022Updated 4 years ago
- Common Sense Security Framework☆15Apr 26, 2018Updated 7 years ago
- RAWRR is a multiplatform app that assists with note taking and report generation for security evaluations.☆18Feb 8, 2023Updated 3 years ago
- A Rust utility DSL and macro to help construct and modify Paths.☆23Jul 11, 2020Updated 5 years ago
- Wordlist generated using leaked databases, Pipal, and CUPP.☆36Apr 12, 2018Updated 7 years ago
- Pastebin OSINT Harvester☆329Apr 27, 2019Updated 6 years ago
- Tool to analyze a lot of APK files☆20Feb 21, 2026Updated last month
- Make your GitHub Stars shine!☆10Sep 13, 2022Updated 3 years ago
- An online tool for building a thorough and well-supported Code of Conduct specific to a community's online and/or offline environment.☆20May 27, 2021Updated 4 years ago
- ARP Poisoning Defense Scripts☆38Oct 14, 2017Updated 8 years ago
- NYC Parks Trees Count! 2015 tree census☆16Jan 23, 2017Updated 9 years ago
- This is a concept poc of command and control server implemented over blockchain☆56Aug 13, 2019Updated 6 years ago
- Plugin for keepnote to import a XML nmap file☆27Jul 8, 2016Updated 9 years ago
- c0r0n4con talk 12 april 2020☆23Apr 13, 2020Updated 5 years ago
- Case, knowledge management and digital investigation platform☆32Feb 26, 2026Updated 3 weeks ago
- Small POC in powershell exploiting hardlinks during the VM deletion process☆53Jan 18, 2020Updated 6 years ago
- This script will generate payloads for basic intrusion detection avoidance. It utilizes publicly demonstrated techniques from several dif…☆34Jun 10, 2018Updated 7 years ago
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- Obtains a list of GPOs based on known Client Side Extensions (CSE) that normally contain passwords☆33May 11, 2019Updated 6 years ago
- Forget "python -m SimpleHTTPServer". redhttpd implements (on top of SimpleHTTPServer) a set of useful features for Red Teaming and Penetr…☆22Jun 26, 2019Updated 6 years ago
- Puny Domain Name Check☆38Jul 29, 2019Updated 6 years ago
- Standardizing Security Titles☆13Dec 31, 2025Updated 2 months ago
- An image Gallery built with Laravel and React☆19Jun 13, 2018Updated 7 years ago
- SAML2 Burp Extension☆33Feb 24, 2026Updated 3 weeks ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Aug 27, 2023Updated 2 years ago