malincwg / cybersec_resourcesView external linksLinks
A curated list of cyber security resources that I find useful and/or entertaining. Includes: Twitter accounts, podcasts, news sources, and much more!
☆22Jan 18, 2018Updated 8 years ago
Alternatives and similar repositories for cybersec_resources
Users that are interested in cybersec_resources are comparing it to the libraries listed below
Sorting:
- Web interface to IntelMQ☆10Sep 10, 2025Updated 5 months ago
- Visual hashes☆25Mar 21, 2017Updated 8 years ago
- The EMP Jammer is an innovative jamming device which jams the devices nearby by inducing an alternating voltage in it .☆13Jan 3, 2023Updated 3 years ago
- Client side web application build to help Youtubers deal with thousands of comments☆10Apr 29, 2020Updated 5 years ago
- CERT Australia Cyber Threat Intelligence (CTI) Toolkit☆15Nov 11, 2017Updated 8 years ago
- This tool is designed to seamlessly convert Postman collections into OpenAPI schemas. This conversion is essential for API security testi…☆12Sep 3, 2024Updated last year
- Misc stuff from internet☆12Nov 5, 2025Updated 3 months ago
- Web Crawler for Identifying Entry Points☆11Mar 26, 2024Updated last year
- 16-bit Amiga classic title remake with HTML5 and PixiJS.☆10Oct 13, 2025Updated 4 months ago
- set of entities for Maltego including common STIX objects and several flavors of kill chain.☆11May 6, 2015Updated 10 years ago
- make stunning terminal presentations using markdown and some ncurses magic☆15May 9, 2015Updated 10 years ago
- A cheatsheet I made while taking OSCP+/PEN-200 in 2024-2025☆33Apr 1, 2025Updated 10 months ago
- Automated authorization checks with multiple headers tool written in golang☆11Jan 3, 2024Updated 2 years ago
- Trafiklabs website☆17Jan 20, 2026Updated 3 weeks ago
- Python module to interact with THOR Thunderstorm service☆17Dec 5, 2025Updated 2 months ago
- Want to run the WOPR over telnet? This server does just that!☆14Apr 10, 2017Updated 8 years ago
- AI modular structure that provides automation-based attack and penetration☆14May 10, 2024Updated last year
- I have created this dashboard to track oscp preparation. I have used several resources and has been mentioned in dashboard. Tjnull's blog…☆13Jul 8, 2022Updated 3 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆12Feb 26, 2024Updated last year
- Dockerfile for AmigaOS Cross-Compiler Toolchain☆11Mar 12, 2018Updated 7 years ago
- Docker image for ENiGMA BBS software☆17Aug 3, 2020Updated 5 years ago
- Guide/comparison of ways to create and host static pages☆12Nov 17, 2017Updated 8 years ago
- The obligatory dotfiles repo.☆14Jan 25, 2026Updated 3 weeks ago
- Penetration Testing & Red Team tools & scripts☆12Sep 22, 2023Updated 2 years ago
- Toolset to analyse TLS datasets☆12Aug 7, 2019Updated 6 years ago
- PoCs of (outdated) privilege escalation vulnerability☆12Dec 31, 2024Updated last year
- Live system forensic collector☆16Jun 8, 2022Updated 3 years ago
- Randomizes clock when systems boots by adding a few seconds and nanoseconds to enforce the design goal, that the host clock and Gateway/…☆14Feb 6, 2026Updated last week
- BBS ANSI adverts that can be shown to users at logoff☆15May 1, 2023Updated 2 years ago
- ☆17Jun 28, 2023Updated 2 years ago
- Collections of Tools, Bookmarks, and other guides created to aid in OSINT collection☆18Aug 18, 2021Updated 4 years ago
- Utility for scanning folders recursively, to find files for which there is no matching shortcut in (a subfolder of) any user-defined fold…☆10Nov 30, 2020Updated 5 years ago
- A streamlined tool for deobfuscating JavaScript obfuscated by Incapsula / Imperva UTMVC, enhancing code readability and ease of analysis.☆21Jan 19, 2024Updated 2 years ago
- Useful Pentest tool links☆12Aug 13, 2020Updated 5 years ago
- A gateway for running a DOS BBS accessable via telnet under Linux and DOSBox, written in Perl.☆14Jan 31, 2012Updated 14 years ago
- Image Payload Creating/Injecting tools☆13Jun 6, 2021Updated 4 years ago
- [Mirror] thc.org uses a CA that is not trusted on a base Arch system so we are mirroring some source here.☆15Nov 9, 2013Updated 12 years ago
- Automatically detected Relay Groups on the Tor Network☆14Aug 14, 2023Updated 2 years ago
- A command-line application for 30 seconds of code snippets☆15Jan 16, 2023Updated 3 years ago