A cybersecurity guy's curated list of useful browser bookmarks
☆15Mar 6, 2025Updated last year
Alternatives and similar repositories for awesome-cybersecurity-bookmarks
Users that are interested in awesome-cybersecurity-bookmarks are comparing it to the libraries listed below
Sorting:
- Lazy SPL to detect Spring4Shell exploitation☆12Jul 8, 2022Updated 3 years ago
- Rapid Response sample Foundry app☆17Updated this week
- ☆10Mar 31, 2024Updated last year
- PowerShell scripts to aid investigators when utilizing O365 and Magnet Axiom.☆12Aug 26, 2024Updated last year
- This repository is a collection of Awesome XSS Payloads in 1 txt file☆11Dec 23, 2019Updated 6 years ago
- FileSigExtractor is a python based tool which extracts the file signatures of all files within a directory and writes the output to a CSV…☆10Jul 15, 2023Updated 2 years ago
- Anteater is Reconnaissance tool for discovering interesting files and folders in a web application that most likely has been misconfigure…☆13Jun 12, 2024Updated last year
- Packet Analysis on Steroids☆13Oct 20, 2022Updated 3 years ago
- Queries for parsed spotlight database in sqlite☆13Dec 29, 2020Updated 5 years ago
- Detection rules and threat hunting queries in Defender XDR and Azure Sentinel☆16Feb 11, 2026Updated 3 weeks ago
- Splunk Searches and Dashboards for DNS Threat Hunting☆10Mar 5, 2018Updated 8 years ago
- GUI for regripper☆11Mar 19, 2019Updated 6 years ago
- My Linux profiles built for Volatility 2/3☆10Oct 11, 2025Updated 4 months ago
- LLM supported Toolkit for Blue Team/ SOC Operations☆46Jan 10, 2026Updated last month
- Lapse (9.00-12.02) + Poops (9.00-12.52) exploit☆27Nov 25, 2025Updated 3 months ago
- Save as PDF addon for Firefox and Google Chrome☆15Jun 12, 2025Updated 8 months ago
- ExploitDB toolkit ExploitDB辅助工具☆11Jul 27, 2021Updated 4 years ago
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a me…☆14May 28, 2025Updated 9 months ago
- ☆10Jan 22, 2025Updated last year
- Training materials I've written.☆11Nov 11, 2025Updated 3 months ago
- $5 Cyber Weapons & How to Use Them☆11Jul 25, 2022Updated 3 years ago
- Volatility plugin to search for all Autostart Extensibility Points (AESPs)☆10May 16, 2024Updated last year
- AWS Live Response☆11Sep 19, 2017Updated 8 years ago
- A package that get baseball data☆13Feb 24, 2025Updated last year
- Python script to run battery of Volatility plugins against a forensic memory image☆10Jun 22, 2019Updated 6 years ago
- A simple utility for stripping out either the SHA-1, MD5 or CRC values alone from the NSRL hash database☆14Nov 19, 2021Updated 4 years ago
- A GitHub action that organizes your post-mortems☆17Oct 12, 2022Updated 3 years ago
- Event forwarder for CrowdStrike Falcon☆11Jan 16, 2024Updated 2 years ago
- Complete translation (EN) of the leaked files related to Conti (chat)☆15Jan 19, 2023Updated 3 years ago
- Here you can find writeups from various CTFs that I've participated in.☆12Jul 30, 2023Updated 2 years ago
- Actual good v3 onion links☆15Jan 19, 2026Updated last month
- NTFS Security Descriptor Stream ($Secure:$SDS) parser☆14Jan 9, 2023Updated 3 years ago
- This batch script reveal all Wi-Fi passwords saved in your computer.☆17Apr 10, 2022Updated 3 years ago
- This website is a collection of the best digital piracy resources. This will help you get started on your pirate voyage.☆12Dec 12, 2021Updated 4 years ago
- Collection of useful command line commands☆14Dec 10, 2021Updated 4 years ago
- A graph-based deep learning tool that can recognizes the kernel objects from raw memory dumps.☆14Jul 6, 2019Updated 6 years ago
- Scripts to for ready-to-use Velociraptor instance deployment in Azure☆14Jun 27, 2023Updated 2 years ago
- Scripts developed to help in mobile forensics investigations☆10Jul 4, 2017Updated 8 years ago
- A collection of cyberchef recipes for use in osint investigations☆14Jul 2, 2022Updated 3 years ago