various courses, presentation etc.
☆168Sep 20, 2025Updated 5 months ago
Alternatives and similar repositories for security-courses
Users that are interested in security-courses are comparing it to the libraries listed below
Sorting:
- ☆14May 30, 2018Updated 7 years ago
- ☆15Feb 5, 2022Updated 4 years ago
- Information about most important hunts which can be performed by Threat hunters while searching for any adversary/threats inside the orga…☆15May 18, 2019Updated 6 years ago
- Firefox extension which parses the headers of all the requests which are being flowing through your firefox browser to detect for vulnera…☆60Oct 28, 2018Updated 7 years ago
- A website and framework for testing NIDS detection☆57Aug 29, 2021Updated 4 years ago
- This is a basic bind shell script , containting both server and client classes, i will upgrade it with time adding new features and make …☆13Jun 11, 2025Updated 8 months ago
- Shell intended for forwarding-only ssh connection via jumphost☆11Jun 27, 2018Updated 7 years ago
- A small pentesting lab for Azure☆10Apr 19, 2019Updated 6 years ago
- Visualizing Path Finding using A* algorithm☆14Nov 7, 2022Updated 3 years ago
- A collection of famous recon public scripts, but in bash <3☆29Mar 2, 2021Updated 5 years ago
- IBM System i (formerly AS400, iSeries, i5, etc.)☆12Feb 10, 2013Updated 13 years ago
- Collection of the cheat sheets useful for pentesting☆10May 11, 2018Updated 7 years ago
- Threat hunting with Sysmon and ArangoDB Graphs☆12Apr 16, 2020Updated 5 years ago
- ☆14Aug 13, 2019Updated 6 years ago
- ElasticSearch vulnerable scanner☆16Oct 6, 2019Updated 6 years ago
- Mr. Radar is a port security evading, discovery device used to detect network switches connected to lone network ports.☆12Feb 13, 2023Updated 3 years ago
- Microsoft Compound File Binary (CFB) file format Python IO☆15Feb 20, 2026Updated 2 weeks ago
- Capture-The-Flag(CTF) toolkit☆11Jan 8, 2015Updated 11 years ago
- Collection of snippets for devtools.☆13Mar 17, 2021Updated 4 years ago
- Primary data pipelines for intrusion detection, security analytics and threat hunting☆85Jan 9, 2022Updated 4 years ago
- A collection of scripts for bug-bounty related stuff☆39Sep 4, 2020Updated 5 years ago
- PDF Parser is a command line tool and go library for analyzing PDF files.☆14Jan 25, 2024Updated 2 years ago
- ReviveIT (revit) is a proof of concept file recovery tool (carver)☆13Dec 3, 2020Updated 5 years ago
- Security test tool for Blind XSS☆26Mar 5, 2020Updated 6 years ago
- ☆15Apr 13, 2021Updated 4 years ago
- This automation protect against subdomain takeover on AWS env which also send alerts on slack.☆12Aug 1, 2021Updated 4 years ago
- Execute Mimikatz with different technique☆51Nov 8, 2021Updated 4 years ago
- ☆81Nov 2, 2019Updated 6 years ago
- PowerShell 'Hero': scripts for DFIR and automation with a PowerShell menu example.☆37Jul 11, 2023Updated 2 years ago
- ☆18Sep 14, 2023Updated 2 years ago
- Simulates a logged in user.☆16Jul 10, 2024Updated last year
- Everything about xss protection technology☆14Oct 22, 2019Updated 6 years ago
- Phactive - Monitoring an Environment with Nmap red teaming☆12May 11, 2019Updated 6 years ago
- An ELK environment containing interesting security datasets.☆136May 11, 2020Updated 5 years ago
- pollen - A command-line tool for interacting with TheHive☆36Jun 6, 2019Updated 6 years ago
- C# alternative to the linux "cat" command... Prints file contents to console. For use with Cobalt Strike's Execute-Assembly☆15Jul 15, 2021Updated 4 years ago
- A multi-threaded scanner that helps identify CORS flaws/misconfigurations☆19Nov 18, 2019Updated 6 years ago
- It's like DocBleach, but in your browser☆18Oct 24, 2019Updated 6 years ago
- RipGit - Scanner/Scraper of git source deployed☆15Jan 17, 2019Updated 7 years ago