iamthefrogy / CyberWatchdogLinks
Monitors and curates cybersecurity-related repositories weekly (Thursday).
☆9Updated last week
Alternatives and similar repositories for CyberWatchdog
Users that are interested in CyberWatchdog are comparing it to the libraries listed below
Sorting:
- Follow the trail of breadcrumbs left behind by any user on a computer or mounted disk image.☆30Updated 7 months ago
- ☆23Updated 5 months ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated last year
- Top 400 passwords as per HaveIBeenPwned☆22Updated 8 months ago
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.☆17Updated 3 weeks ago
- A tech enumeration toolkit focused on 404 Not found pages.☆25Updated 9 months ago
- ☆12Updated 4 months ago
- DorkEye is a Python script for ethical dorking. The goal is to identify unintentionally exposed resources, such as sensitive files, login…☆48Updated last month
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆54Updated last month
- A Burp Suite extension written in Kotlin that enables persistent sticky session handling in web application testing. Built with the Monto…☆11Updated last week
- Living Off Security Tools☆45Updated 8 months ago
- ☆54Updated 5 months ago
- Smarter Asset Search, Faster Information Extraction ZoomEye GPT is a browser extension designed specifically for cybersecurity profession…☆20Updated 2 months ago
- What's the Red Team doing to my Linux Box? - BSides Vienna 2024☆17Updated 7 months ago
- ShoDam is a simple and effective bookmarklet designed to extract IP addresses from Shodan search results with a single click.☆11Updated 7 months ago
- Comprehensive adversary emulation tool for security testing on Google Cloud Platform (GCP) environments.☆14Updated last year
- Have you ever wanted to search a link or IP address on multiple OSINT pages at once?☆53Updated this week
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆35Updated 3 weeks ago
- ☆28Updated 10 months ago
- A series of python scripts to extract information from Dark Web Applications☆12Updated 3 months ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆27Updated 2 years ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆47Updated 4 months ago
- A comprehensive web application security testing toolkit that combines 10 powerful penetration testing features into one tool.☆31Updated 2 months ago
- Tor onion address lookup☆39Updated 5 months ago
- This repository contains a comprehensive testing designed for evaluating the performance and resilience of Endpoint Detection and Respons…☆56Updated 8 months ago
- A network logging tool that logs per process activities☆32Updated 2 years ago
- ☆21Updated 2 years ago
- This repository provides a comprehensive Digital Footprint Checklist to help individuals manage their online presence and enhance privacy…☆14Updated 6 months ago
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆76Updated 2 months ago
- MS Graph Commands and Tools for Blue Teamers☆50Updated last year