k0yt / Awesome-InfoSec-TG-channels
For the most part, these are RUS tg channels and assembled manually in channels.txt. The list of subscribers is updated every 12 hours.
☆30Updated 3 months ago
Alternatives and similar repositories for Awesome-InfoSec-TG-channels:
Users that are interested in Awesome-InfoSec-TG-channels are comparing it to the libraries listed below
- ☆124Updated 3 years ago
- ☆94Updated last year
- 1C RAS Offensive Security Tool☆24Updated last year
- Check bitrix vulnerabilities☆69Updated last year
- Some nuclei templates for pentest CMS Bitrix☆24Updated 7 months ago
- A monster cheatsheet on MITM attacks☆324Updated 11 months ago
- An OSINT tool tailored for comprehensive collection, analysis, and interpretation of cyber threat intelligence from Telegram channels and…☆81Updated 9 months ago
- Public OCI-Image (docker image) Security Checker☆14Updated last week
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆315Updated 3 months ago
- A collection of all my personal cheat sheets and guides as I progress through my career in offensive security.☆110Updated this week
- ☆112Updated this week
- Amazing whoami alternatives☆138Updated 10 months ago
- Jasmin ransomware web panel path traversal PoC☆21Updated 9 months ago
- Useful collection of scapy-scripts and more☆26Updated 7 months ago
- https://t.me/+V6d8SvKVFXo2MjIy☆43Updated last year
- Setezor is a network traffic analyzer with the ability to automatically build network topology☆135Updated this week
- SneakPeeker is a tool for finding and removing Canary tokens.☆14Updated last month
- ☆101Updated last month
- A high-performance Go-based tool for checking the availability and responsiveness of domains, utilizing both HTTP requests and browser au…☆78Updated 2 months ago
- Hackings style defence tricks☆24Updated 2 weeks ago
- NTP Exfiltration Tool☆137Updated last year
- Browser extension that leverages TruffleHog to scan web traffic in real-time for exposed secrets☆82Updated last month
- exfiltration/infiltration toolkit☆43Updated 2 months ago
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆48Updated 4 months ago
- Reverse Engineering and Malware Analysis Roadmap☆61Updated 5 months ago
- ☆56Updated 3 months ago
- Application Fuzzing: Tools, Techniques, and Best Practices☆157Updated 4 months ago
- A collection of tools that I use in CTF's or for assessments☆82Updated 2 weeks ago
- Tool for hiding Kali Linux on the network☆307Updated 8 months ago
- Modern web-based distributed hashcracking solution, built on hashcat☆114Updated last week