A list of online news & info sources in the InfoSec/Cybersecurity space
☆403Apr 10, 2026Updated 3 weeks ago
Alternatives and similar repositories for allinfosecnews_sources
Users that are interested in allinfosecnews_sources are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- git svn clone of official repo☆20Apr 5, 2011Updated 15 years ago
- ☆423May 26, 2025Updated 11 months ago
- Periodic cyber security newsletters that capture the latest news, summaries of conference talks, research, best practices, tools, events,…☆1,298Apr 6, 2026Updated 3 weeks ago
- List of sources for cybersecurity news☆41Dec 16, 2022Updated 3 years ago
- A set of Ansible playbooks to build and maintain your own private cloud☆11Mar 2, 2025Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Light-weight web security scanner☆149Nov 22, 2025Updated 5 months ago
- A curated list of Awesome Threat Intelligence Blogs☆540Apr 27, 2026Updated last week
- This repository is aimed to contain all basic tools and resources for cybersecurity. In this repository you will get all material which y…☆76Oct 25, 2024Updated last year
- Ресурсы, связанные с безопасностью приложений, исследователями и разработчиками в области безопасности.☆50Feb 23, 2022Updated 4 years ago
- Script to test NetSec capabilities.☆21May 1, 2023Updated 3 years ago
- Personal blog about cyber security and challenges☆20Mar 25, 2026Updated last month
- Use this bot to monitor new CVEs containing defined keywords and send alerts to Slack and/or Telegram.☆260Jun 8, 2025Updated 10 months ago
- Awesome list of keywords and artifacts for Threat Hunting sessions☆655Aug 4, 2025Updated 9 months ago
- Discover and watch the latest cybersecurity conference talks. A curated archive of public security conference content.☆282Updated this week
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆198Jan 18, 2023Updated 3 years ago
- Atlassian Confluence Server 7.5.1 Pre-Authorization Arbitrary File Read vulnerability (CVE-2021-26085)☆14Oct 12, 2021Updated 4 years ago
- Exploring hands-on Cybersecurity techniques with a comprehensive repository covering offensive and defensive tools for home-lab environme…☆21Mar 27, 2024Updated 2 years ago
- Smart and efficient tool to automate open redirect detection at scale.☆10Mar 21, 2022Updated 4 years ago
- Bruteforce DPAPI encrypted MasterKey File from Windows Credentials Manager☆23Jan 4, 2025Updated last year
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆6,824Apr 28, 2026Updated last week
- Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows…☆2,108Dec 11, 2024Updated last year
- This script searches messages containing specified search terms in Telegram channels the user is a member of.☆62Jul 11, 2023Updated 2 years ago
- Collection of knowledge about information security☆677Mar 8, 2026Updated last month
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆16Dec 7, 2025Updated 4 months ago
- Mind-Maps of Several Things☆2,651Jun 29, 2023Updated 2 years ago
- Search this list of OSINT Practitioners and learn about OSINT, it includes numerous, blogs and tutorials.☆103Oct 12, 2025Updated 6 months ago
- Useful Techniques, Tactics, and Procedures for red teamers and defenders, alike!☆1,864Apr 27, 2026Updated last week
- The openSquat is an open-source tool for detecting domain look-alikes by searching for newly registered domains that might be impersonati…☆954Apr 27, 2026Updated last week
- Find sensitive information using dorks from different search-engines.☆93Oct 24, 2024Updated last year
- Practical Ethical Hacking Labs 🗡🛡☆3,450Apr 23, 2024Updated 2 years ago
- Speed up your pentest enumeration☆83Oct 5, 2025Updated 6 months ago
- ThreatSeeker: Threat Hunting via Windows Event Logs☆123May 16, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆100Jan 13, 2026Updated 3 months ago
- PoC_CVEs☆170Nov 28, 2025Updated 5 months ago
- A security assessment tool for analyzing Active Directory Group Policy Objects (GPOs) to identify misconfigurations and vulnerabilities☆324Mar 27, 2025Updated last year
- OSINT Template Engine☆572Jul 20, 2023Updated 2 years ago
- A comprehensive guide for web application penetration testing and bug bounty hunting, covering methodologies, tools, and resources for id…☆1,798Sep 11, 2025Updated 7 months ago
- Threat Hunting is time consuming enough as it is. Coming up with and tracking metrics to justify your hunt team to the Execs often takes…☆13Dec 7, 2022Updated 3 years ago
- Awesome Security lists for SOC/CERT/CTI☆1,437Updated this week