kaiiyer / Cyber-ChristmasView external linksLinks
A curated list of resources for Cyber Professionals
☆16Dec 27, 2020Updated 5 years ago
Alternatives and similar repositories for Cyber-Christmas
Users that are interested in Cyber-Christmas are comparing it to the libraries listed below
Sorting:
- An All in one Project for Digital Privacy. A step towards a PRIVATE FUTURE☆45Jan 20, 2025Updated last year
- ☆24Oct 12, 2021Updated 4 years ago
- Just another collection of links, tools, reports and other stuff☆24Jun 22, 2021Updated 4 years ago
- Data Structures and Algorithms. Contribute and Learn together.☆11Oct 11, 2022Updated 3 years ago
- Curated list of design and UI resources from stock photos, web templates, CSS frameworks, UI libraries, tools and much more☆32Jul 15, 2020Updated 5 years ago
- StreamlitとLangGraphで実装したHuman-in-the-loop広告コピー文生成アプリケーション☆11Feb 15, 2025Updated last year
- Zeek Training Materials/Products☆41Feb 2, 2026Updated 2 weeks ago
- ☆11Dec 5, 2022Updated 3 years ago
- MinIO nodes for n8n☆11Feb 2, 2026Updated 2 weeks ago
- ⚡ Developer-friendly hybrid-RAG toolkit merging Graphiti, Qdrant, mem0, LlamaIndex, and LangChain into one powerful engine.☆15Jan 14, 2026Updated last month
- Info & resources for CSC 325 Computer Architecture at TCNJ☆11Oct 1, 2020Updated 5 years ago
- A little bit of help.☆13Jul 25, 2024Updated last year
- A technical companion repository archiving code implementations and research artifacts shared on ResearchGate.☆12Feb 7, 2026Updated last week
- Extracts SNIs from a pcap and generates output usable in `etc/hosts` file and Burp config for proxying non-proxy-aware thick clients usin…☆12Jun 23, 2020Updated 5 years ago
- cidrgen is based on cidr's subnet IP list generator☆15Aug 21, 2020Updated 5 years ago
- Cyber Security Challenge Australia 2014 Files☆18May 9, 2014Updated 11 years ago
- Yet Another Fake Honeypot written in Go☆10Dec 8, 2017Updated 8 years ago
- EH-Bble☆10Jul 23, 2019Updated 6 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Sep 17, 2019Updated 6 years ago
- Simple tool to monitor network changes over time and trigger alerts☆15Mar 11, 2020Updated 5 years ago
- Malware samples observed in the wild from time to time☆12Jul 29, 2019Updated 6 years ago
- Convert Bat to exe☆10Aug 25, 2020Updated 5 years ago
- This app has two section, first one is a complete trigonometric calculator and another is a complete list of trigonometric identities and…☆14Dec 11, 2022Updated 3 years ago
- http CONNECT tunnel☆10Mar 26, 2020Updated 5 years ago
- ☆11May 24, 2017Updated 8 years ago
- TCP/HTTP packet sniffer in Go☆13Jul 11, 2025Updated 7 months ago
- Search bing with python☆12Sep 25, 2014Updated 11 years ago
- OSCP Prep notes☆14Oct 18, 2020Updated 5 years ago
- bug bounty☆11Aug 13, 2023Updated 2 years ago
- Set of scripts to index PCAP files and retrieve packets☆14Sep 10, 2015Updated 10 years ago
- Plaform independent reverse shell over https☆11Mar 2, 2020Updated 5 years ago
- Smokeping SSH Probe for Mikrotik RouterOS☆16Jan 11, 2026Updated last month
- Mass malicious script dump/Malware src dump☆16Nov 25, 2016Updated 9 years ago
- Whenever PowerShell is launched, Notepad will also open. You can customize the script for educational purposes, but I emphasize that I do…☆12Apr 21, 2025Updated 9 months ago
- A collection of notes and rules (Snort/Suricata, Sigma, and YARA) to identify various samples of malware.☆14Sep 7, 2021Updated 4 years ago
- Code for intro to DSPy blog post☆29Oct 13, 2025Updated 4 months ago
- a scanner for scan website's directories and files☆12Oct 15, 2017Updated 8 years ago
- Training materials I've written.☆11Nov 11, 2025Updated 3 months ago
- Here are some tools I developed to help analyze malware☆11Nov 8, 2023Updated 2 years ago