kaiiyer / Cyber-ChristmasLinks
A curated list of resources for Cyber Professionals
☆16Updated 5 years ago
Alternatives and similar repositories for Cyber-Christmas
Users that are interested in Cyber-Christmas are comparing it to the libraries listed below
Sorting:
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆82Updated 5 years ago
- An All in one Project for Digital Privacy. A step towards a PRIVATE FUTURE☆47Updated 11 months ago
- Tracking my journey towards earning my OSCP. This includes the process of everything that I learn along the way.☆47Updated 4 years ago
- ☆48Updated 7 years ago
- This contains a list of Blue Team Tools that I use daily, and have stored here for reference.☆34Updated 8 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆99Updated 2 years ago
- [180+ scripts] There are a few genuine gems in there. And a lot of spaghetti code. Most of these scripts were for solving CTF's. If you …☆63Updated 2 years ago
- Cybersecurity Notes☆166Updated last year
- BlueBox Malware analysis Box and Cyber threat intelligence.☆45Updated 3 years ago
- This repository is for tools, guides, cheatsheets, and anything else related to learning all different aspects of security.☆96Updated 3 years ago
- ☆11Updated 3 years ago
- ☆22Updated 7 years ago
- ☆107Updated 4 years ago
- Script to manage and create local pentesting training virtual lab☆50Updated 5 years ago
- Attack Surface Discovery Tool☆110Updated last year
- eLearnSecurity Certified Exploit Development☆105Updated 4 years ago
- BSidesRoc 2022 Linux Malware/Forensics Course☆76Updated 3 years ago
- This project is no longer maintained☆12Updated 5 years ago
- ☆45Updated 4 years ago
- Code repository for "Machine Learning For Red Team Hackers".☆41Updated 5 years ago
- Cheat-Sheet of tools for penetration testing☆54Updated 2 years ago
- This lab is created to demonstrate pass-the-hash, blind sql and SSTI vulnerabilities☆92Updated 2 years ago
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆45Updated 2 years ago
- A set of recipes useful in pentesting and red teaming scenarios☆146Updated 2 years ago
- SIEM Cheat Sheet☆77Updated 2 years ago
- ☆19Updated 4 years ago
- This is a repository for network security tools and technologies.☆101Updated 3 years ago
- ☆50Updated 5 years ago
- Writeup for the challenges in H@cktivityCon CTF 2020☆17Updated 5 years ago
- Windows File Integrity -- an archive of information on installed Windows binaries.☆32Updated 3 years ago