kiathan / rhulcsnotesLinks
☆32Updated 5 years ago
Alternatives and similar repositories for rhulcsnotes
Users that are interested in rhulcsnotes are comparing it to the libraries listed below
Sorting:
- A Game of Hackers (CTF Scoreboard & Game Manager)☆1,083Updated 6 months ago
- Interview questions to screen offensive (red team/pentest) candidates☆889Updated 6 years ago
- ☆1,177Updated last year
- Worlds fastest steghide cracker, chewing through millions of passwords per second☆1,235Updated 2 years ago
- Trend Vision One API cookbook sample code☆14Updated last week
- IoTGoat is a deliberately insecure firmware created to educate software developers and security professionals with testing commonly foun…☆860Updated 4 months ago
- Tool to export Juice Shop challenges and hints in data format compatible with CTFd, RootTheBox or FBCTF☆460Updated 2 weeks ago
- A Bluetooth low energy capture the flag☆740Updated 5 months ago
- Host and manage multiple Juice Shop instances for security trainings and Capture The Flags☆306Updated this week
- A set of security related tools☆685Updated 4 years ago
- Curated list of tools and resources related to the use of machine learning for cyber security☆1,516Updated 5 years ago
- VECTR is a tool that facilitates tracking of your red and blue team testing activities to measure detection and prevention capabilities a…☆1,547Updated 2 months ago
- Printer Exploitation Toolkit - The tool that made dumpster diving obsolete.☆4,211Updated last year
- Chepy is a python lib/cli equivalent of the awesome CyberChef tool.☆1,027Updated last month
- Yet another Stego Tool☆401Updated 2 years ago
- Least Significant Bit Steganography for bitmap images (.bmp and .png), WAV sound files, and byte sequences. Simple LSB Steganalysis (LSB …☆643Updated 3 months ago
- A curated list of resources related to Industrial Control System (ICS) security.☆1,914Updated 3 months ago
- The Secure Coding Dojo is a platform for delivering secure coding knowledge.☆594Updated 2 months ago
- Antora/Asciidoc content for Bjoern Kimminich's free eBook "Pwning OWASP Juice Shop"☆232Updated this week
- Read local Chrome cookies without root or decrypting☆649Updated 3 years ago
- rsatool can be used to calculate RSA and RSA-CRT parameters☆1,546Updated last year
- A list of shodan filters☆584Updated 7 years ago
- various courses, presentation etc.☆168Updated 4 months ago
- ☆19Updated 3 years ago
- A curated list of useful resources that cover Offensive AI.☆1,336Updated last week
- An open source threat modeling tool from OWASP☆1,310Updated this week
- ☆313Updated last week
- An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction☆1,116Updated 4 years ago
- Write-ups for Break The Syntax CTF 2024☆12Updated last year
- Damn Vulnerable Web Services is a vulnerable application with a web service and an API that can be used to learn about webservices/API re…☆502Updated last week