fidogolu / CyberSecurity
☆15Updated last year
Alternatives and similar repositories for CyberSecurity:
Users that are interested in CyberSecurity are comparing it to the libraries listed below
- A cheat sheet that contains the most OpenSSL commands used by Dev, SysAdmin in real life.☆59Updated 4 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 3 months ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- A directory of cheat sheets to use with TLDR, cheat.sh, or Navi☆14Updated last month
- passat - password auditing tool. Does statistical analyses on large sets of cracked passwords.☆24Updated 3 years ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated 9 months ago
- Collection of Tools & Techniques for analyzing URLs☆30Updated last year
- Melee: Tool to Detect Infections in MySQL Instances☆21Updated last year
- File integrity monitor proof-of-concept in PowerShell sends a message via Telegram when it detects changes to a specified directory. It c…☆11Updated 2 years ago
- This is the official repository for Basic Malware Analysis Course☆19Updated 3 years ago
- ☆17Updated 3 years ago
- create a "simulated internet" cyber range environment☆15Updated 2 weeks ago
- Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding in…☆25Updated 2 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 2 years ago
- Timestomp Tool to flatten MAC times with a specific timestamp☆45Updated last year
- Recreation of most of the Raccoon Infostealer's functionality, true to threat intelligence, for safe testing in organizational environmen…☆16Updated last year
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 7 months ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆18Updated last year
- Scan and decode NetWire logs☆11Updated 2 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆51Updated 2 months ago
- A broken-by-design Azure environment to practice and train security skills in the cloud domain.☆26Updated 9 months ago
- Custom pentesting tools☆24Updated 4 years ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆50Updated last year
- ☆79Updated last year
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 3 years ago
- Comprehensive adversary emulation tool for security testing on Google Cloud Platform (GCP) environments.☆14Updated 8 months ago
- Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152☆18Updated 2 years ago
- A knowledge source about TTPs used to target GenAI-based systems, copilots and agents☆26Updated last month
- Bloodhound Portable for Windows☆51Updated last year
- CIS Benchmark testing of Windows SIEM configuration☆44Updated last year