various courses, presentation etc.
☆168May 10, 2026Updated last week
Alternatives and similar repositories for security-courses
Users that are interested in security-courses are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆14May 30, 2018Updated 7 years ago
- Firefox extension which parses the headers of all the requests which are being flowing through your firefox browser to detect for vulnera…☆60Oct 28, 2018Updated 7 years ago
- Meeting notes☆14Apr 5, 2016Updated 10 years ago
- Information about most important hunts which can be performed by Threat hunters while searching for any adversary/threats inside the orga…☆15May 18, 2019Updated 7 years ago
- A small pentesting lab for Azure☆10Apr 19, 2019Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A tools for JavaScript Recon☆24Jul 25, 2020Updated 5 years ago
- Threat hunting with Sysmon and ArangoDB Graphs☆13Apr 16, 2020Updated 6 years ago
- Scripts and integrations for OSSEC☆41Mar 18, 2016Updated 10 years ago
- ÜberDig - dig on steroids☆16Apr 23, 2026Updated 3 weeks ago
- Visualizing Path Finding using A* algorithm☆14Nov 7, 2022Updated 3 years ago
- A website and framework for testing NIDS detection☆57Aug 29, 2021Updated 4 years ago
- Cybersecurity Incidents Mind Maps☆34Sep 29, 2021Updated 4 years ago
- A strategic framework and operational plan for organizations seeking to reduce dependency on US technology vendors and increase digital s…☆32Jun 6, 2025Updated 11 months ago
- Collection of snippets for devtools.☆13Mar 17, 2021Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Phactive - Monitoring an Environment with Nmap red teaming☆12May 11, 2019Updated 7 years ago
- Use bitsadmin to maintain persistence and bypass Autoruns☆67Jul 18, 2017Updated 8 years ago
- An ELK environment containing interesting security datasets.☆136May 11, 2020Updated 6 years ago
- A multi-threaded scanner that helps identify CORS flaws/misconfigurations☆19Nov 18, 2019Updated 6 years ago
- BornHack Badge 2023☆17Oct 15, 2023Updated 2 years ago
- A collection of famous recon public scripts, but in bash <3☆29Mar 2, 2021Updated 5 years ago
- ☆15Apr 13, 2021Updated 5 years ago
- CP850 cmd game in C# .NET☆13Jan 31, 2020Updated 6 years ago
- ☆20Jun 11, 2013Updated 12 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆18Sep 6, 2018Updated 7 years ago
- Scripts used for phishing campaigns☆14Aug 18, 2014Updated 11 years ago
- A proof-of-concept scanner to check an RDG Gateway Server for vulnerabilities CVE-2020-0609 & CVE-2020-0610.☆68Jan 26, 2020Updated 6 years ago
- Security test tool for Blind XSS☆26Mar 5, 2020Updated 6 years ago
- Code snippets from my blog☆29Oct 13, 2025Updated 7 months ago
- ☆29Feb 16, 2021Updated 5 years ago
- 优质安全 list☆12Nov 22, 2017Updated 8 years ago
- Execute Mimikatz with different technique☆51Nov 8, 2021Updated 4 years ago
- ☆18Sep 14, 2023Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- This is a basic bind shell script , containting both server and client classes, i will upgrade it with time adding new features and make …☆13Jun 11, 2025Updated 11 months ago
- C# alternative to the linux "cat" command... Prints file contents to console. For use with Cobalt Strike's Execute-Assembly☆15Jul 15, 2021Updated 4 years ago
- Primary data pipelines for intrusion detection, security analytics and threat hunting☆85Jan 9, 2022Updated 4 years ago
- ☆82Nov 2, 2019Updated 6 years ago
- All kind of frida stuff when needed in pentesting or reverse engineering of an android app - The perfect starter kit☆18Jun 2, 2020Updated 5 years ago
- Cyber Defence Monitoring Course Suite :: Suricata, Bro, Moloch☆61Feb 20, 2017Updated 9 years ago
- Microsoft Compound File Binary (CFB) file format Python IO☆15Apr 2, 2026Updated last month