A curated list of awesome infosec resources.
☆32May 31, 2015Updated 10 years ago
Alternatives and similar repositories for awesome-infosec
Users that are interested in awesome-infosec are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Penetration Testing/Security Cheatsheets☆65Oct 31, 2015Updated 10 years ago
- devops scripts☆33Dec 8, 2016Updated 9 years ago
- Socks5 proxy server by golang☆11Oct 10, 2019Updated 6 years ago
- Use Tor for anonymous scanning with nmap☆95Jun 19, 2015Updated 10 years ago
- A curated list of awesome Deep Learning tutorials, projects and communities.☆14Oct 24, 2016Updated 9 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- The official exploit for Open-AudIT v3.3.1 Remote Code Execution CVE-2020-12078☆18Apr 28, 2020Updated 6 years ago
- site source jivoi.github.io☆23Nov 7, 2022Updated 3 years ago
- home! sweet home☆25Aug 23, 2019Updated 6 years ago
- Summary and archives of leaked Vietnam TLD DNS data☆46Sep 4, 2017Updated 8 years ago
- Strafer: A tool to detect potential infections in Elasticsearch instances☆27Mar 14, 2021Updated 5 years ago
- An agent that performs user actions on a workstation☆13Jan 22, 2018Updated 8 years ago
- Efficient clustering of MASSCAN results☆12Dec 26, 2016Updated 9 years ago
- Email OSINT and password breach hunting. Use h8mail to find passwords through different breach and reconnaissance services, or the infamo…☆10Jun 12, 2019Updated 6 years ago
- Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons co…☆11Dec 28, 2016Updated 9 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Wireless pentesting tool with functionalities such as password cracking (in WEP and WPA/WPA2 networks), DoS attacks, client de-authentica…☆12Apr 8, 2024Updated 2 years ago
- CyberSpy is a repository with innate and third party services that can be used for doxing, profiling & identity searching.☆11Jul 8, 2019Updated 6 years ago
- ☆11Sep 15, 2020Updated 5 years ago
- ☆10Jun 14, 2016Updated 9 years ago
- Offensive OSINT☆33Sep 5, 2020Updated 5 years ago
- remote control an android phone via ADB☆10Nov 17, 2015Updated 10 years ago
- Small and highly portable detection tests.☆13Apr 13, 2018Updated 8 years ago
- Defensive-oriented Active Directory enumeration☆23Jan 22, 2016Updated 10 years ago
- A collection of awesome web crawler,spider in different languages☆12Oct 6, 2017Updated 8 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Document tracing and tracking. Dracker lets you "tag" documents with a phone home call when MS Word documents are opened. This applicatio…☆14Mar 26, 2014Updated 12 years ago
- Pentesting Hacking Tools, Scripts, Windows, Linux,☆29Feb 27, 2016Updated 10 years ago
- Get files from Android directories☆11Dec 9, 2018Updated 7 years ago
- Simple tool to regularly pool Tor HSDirs for hidden service descriptors☆10Jul 3, 2015Updated 10 years ago
- A list of telco security resources and projects.☆13Feb 22, 2020Updated 6 years ago
- A command-line whois - like client for the WHOIS and WHOIS History APIs by WhoisXML API Inc.☆19Feb 9, 2022Updated 4 years ago
- A collection of notes and rules (Snort/Suricata, Sigma, and YARA) to identify various samples of malware.☆14Sep 7, 2021Updated 4 years ago
- This is a project that can bypass the android hidden api restictrion and bypass dlfcn restriction for system lib.☆26Mar 7, 2022Updated 4 years ago
- Cython library for Wireguard☆18Apr 8, 2026Updated last month
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆15Jun 17, 2016Updated 9 years ago
- Practice CTI Quiz☆13Mar 20, 2024Updated 2 years ago
- Chase subdomains by parsing the results of Google and Yandex search results☆15Sep 29, 2023Updated 2 years ago
- Some stuff about telecom security☆15Feb 21, 2016Updated 10 years ago
- My thesis of me and my friend. Subject for Android security☆14Sep 19, 2019Updated 6 years ago
- Repository for hosting the MITRE Cyber Academy website.☆11Apr 12, 2023Updated 3 years ago
- Script to tether your turtle to your laptop so that your turtle gets internet over your laptops connection instead of your laptop getting…☆14Aug 22, 2015Updated 10 years ago