A cybersecurity guy's curated list of useful browser bookmarks
☆15Mar 6, 2025Updated last year
Alternatives and similar repositories for awesome-cybersecurity-bookmarks
Users that are interested in awesome-cybersecurity-bookmarks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆10Mar 31, 2024Updated 2 years ago
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a me…☆14May 28, 2025Updated 10 months ago
- ☆19Mar 9, 2022Updated 4 years ago
- Rapid Response sample Foundry app☆17Updated this week
- deadsimple BSD Security Advisories and Announcements☆19Apr 8, 2026Updated last week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Checks observables/ioc in TheHive/Cortex against the MISP warningslists☆14Dec 27, 2017Updated 8 years ago
- Lapse (9.00-12.02) + Poops (9.00-12.52) exploit☆30Nov 25, 2025Updated 4 months ago
- Event forwarder for CrowdStrike Falcon☆11Jan 16, 2024Updated 2 years ago
- CrowdStrike Falcon log forwarder from falcon S3 bucket to your S3 bucket☆11Apr 15, 2021Updated 5 years ago
- Notes from my "Implementing a Kick-Butt Training Program: Blue Team GO!" talk☆14Mar 4, 2019Updated 7 years ago
- ExploitDB toolkit ExploitDB辅助工具☆11Jul 27, 2021Updated 4 years ago
- $5 Cyber Weapons & How to Use Them☆11Jul 25, 2022Updated 3 years ago
- CRUSOE: A Toolset for Cyber Situational Awareness and Decision Support in Incident Handling Inspired by the OODA Loop☆15Dec 11, 2024Updated last year
- ☆20Nov 23, 2022Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Repo for Automations and other solutions for Elastic SIEM/Security.☆18Jun 15, 2021Updated 4 years ago
- Incident Response Report Using GitHub-Sphinx☆21Oct 28, 2019Updated 6 years ago
- This repository is a collection of Awesome XSS Payloads in 1 txt file☆11Dec 23, 2019Updated 6 years ago
- A repository to share contributions related to TheHive Project☆22Sep 15, 2021Updated 4 years ago
- Color Schemes for Konsole Terminal☆10Jun 23, 2022Updated 3 years ago
- A simple framework for distributed task workflow using redis.☆32Jan 13, 2014Updated 12 years ago
- Perform OSINT on external targets using Shodan☆23Feb 7, 2024Updated 2 years ago
- Exploit code for CVE-2019-17662☆18Sep 12, 2021Updated 4 years ago
- Complete translation (EN) of the leaked files related to Conti (chat)☆17Jan 19, 2023Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A script to create and assign SOP tasks into the cases☆20Aug 16, 2020Updated 5 years ago
- Queries for parsed spotlight database in sqlite☆13Dec 29, 2020Updated 5 years ago
- Anteater is Reconnaissance tool for discovering interesting files and folders in a web application that most likely has been misconfigure…☆13Jun 12, 2024Updated last year
- XML metadata and downloads for NIST Technical Series Publications☆27Apr 1, 2026Updated 2 weeks ago
- 107逢甲-安全程式設計-教材與CTF題目☆12Nov 2, 2019Updated 6 years ago
- single-threaded event driven sleep obfuscation poc for linux☆38Jun 14, 2025Updated 10 months ago
- GUI for regripper☆11Mar 19, 2019Updated 7 years ago
- Field guide to gather low-hanging fruits☆14Mar 20, 2025Updated last year
- Scripts to for ready-to-use Velociraptor instance deployment in Azure☆14Jun 27, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Open Redirect Vulnerability Payload List☆10Feb 23, 2021Updated 5 years ago
- Welcome to my GitHub repository housing comprehensive handwritten notes from the IBM Cybersecurity Analyst Professional certification. Di…☆23Feb 27, 2024Updated 2 years ago
- A little tool to filter the stranger strings from a binary so you can analyze the good ones☆54Sep 11, 2025Updated 7 months ago
- TIBER-Cases is a project created to give cases of The Hive platform for Threat Intelligence Analysts mainly. All the cases are mapped to …☆27Jul 13, 2022Updated 3 years ago
- ☆23Dec 14, 2020Updated 5 years ago
- My Linux profiles built for Volatility 2/3☆11Oct 11, 2025Updated 6 months ago
- ☆11Dec 9, 2025Updated 4 months ago