junior-devleague / cyber-securityLinks
Cyber Security Training Resources
☆15Updated 6 years ago
Alternatives and similar repositories for cyber-security
Users that are interested in cyber-security are comparing it to the libraries listed below
Sorting:
- Youtube Download Manager☆50Updated 7 years ago
- 🔎 Find usernames across social networks.☆60Updated 5 years ago
- For FUN! Use at your own risk. No warranties, no exceptions.☆19Updated 2 years ago
- Digital Forensics with Kali Linux, published by Packt☆92Updated 2 years ago
- Pentest ToolKit☆28Updated 5 years ago
- MEMEX Weapons Pilot for the illegal weapons domain.☆15Updated 9 years ago
- A DarkWeb Crawler based off the open-source TorSpider. Indexing with search engine created using Apache Solr.☆38Updated 6 years ago
- hack tools☆15Updated 6 years ago
- Extract and Visualize Data from URLs using Unfurl☆9Updated 3 years ago
- A program with a nice UI that downloads OnlyFans content.☆14Updated 4 years ago
- Single stop for security related stuff☆57Updated 8 years ago
- Find all hostnames related to a given domain. Helpful during VA/PT work.☆15Updated 3 years ago
- Local Transforms for the Maltego OSINT investigative tool that act on FetLife.com.☆40Updated 5 years ago
- Contec Smart Home unauthorized user added☆11Updated 7 years ago
- Created by Denis Podgurskiy via the GitHub Connector☆12Updated 4 years ago
- A repository of Tor hidden services.☆65Updated 3 years ago
- Whatsapp forensics and profiler tool - Useful for digital forensics and social media intelligence (SOCMINT)☆15Updated 6 years ago
- OSINT scanning tool which discovers and maps directories found in javascript files hosted on a website.☆14Updated 6 years ago
- A repository for personal tracking.☆15Updated 3 years ago
- Kali Linux Wireless Penetration Testing Beginner's Guide - Third Edition, published by Packt☆27Updated 2 years ago
- Google dorks for OSINT☆27Updated 5 years ago
- Man-in-the-middle against Tor bridges☆26Updated 5 years ago
- Deep web crawler and search engine☆52Updated 4 years ago
- This is a place for all things OSINT & Bookmarklets!☆13Updated 4 years ago
- A copy of articles published at Peerlyst☆40Updated 8 years ago
- Social Engineering template for credential harvesting. (Facebook as an example).☆45Updated 7 years ago
- Tools for baiting phone-tech-support-scammers☆23Updated 5 years ago
- Build tools to generate vagrant images used by metasploit-framework CI☆13Updated 5 months ago
- Aerial platform for Recon, Intelligence and Pentesting. #R-KALI #Porunga☆16Updated 6 years ago
- Interface for the Shodan Computer Search Engine API☆26Updated 4 years ago