A curated list of cyber security resources that I find useful and/or entertaining. Includes: Twitter accounts, podcasts, news sources, and much more!
☆22Jan 18, 2018Updated 8 years ago
Alternatives and similar repositories for cybersec_resources
Users that are interested in cybersec_resources are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Small collection about free cybersecurity materials☆38Jul 25, 2021Updated 4 years ago
- Various Write Ups from OverTheWire, TryHackMe, HackTheBox, CrackMes.one and more!☆12Dec 25, 2022Updated 3 years ago
- A repository contains all sort of cheat-sheets for various things.☆11Sep 24, 2021Updated 4 years ago
- an Improoved Version of 0xNinjaCyclone´s EarlyCascade Code☆22Feb 20, 2025Updated last year
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆12Aug 30, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Linux Loadable Kernel Module Rootkit for Linux Kernel 5.x up to linux kernel 6.8 on x86_64, hides files, hides process, hides bind shell …☆18Feb 15, 2026Updated 2 months ago
- A tool that adds reproducible UUIDs to YARA rules☆13Apr 24, 2024Updated 2 years ago
- The EMP Jammer is an innovative jamming device which jams the devices nearby by inducing an alternating voltage in it .☆13Jan 3, 2023Updated 3 years ago
- Resumão da massa sobre Capture the Flag.☆19Jan 12, 2021Updated 5 years ago
- A ring0 Loadable Kernel Module (Linux) for latest kernels 6.x☆105Dec 16, 2025Updated 4 months ago
- Development guide for Volatility Plugins☆22Sep 6, 2017Updated 8 years ago
- Misc stuff from internet☆12Apr 13, 2026Updated 3 weeks ago
- Machines, Sherlocks, Challenges, Season III,IV☆15Apr 17, 2024Updated 2 years ago
- ☆17Jun 28, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- [Mirror] thc.org uses a CA that is not trusted on a base Arch system so we are mirroring some source here.☆15Nov 9, 2013Updated 12 years ago
- AI modular structure that provides automation-based attack and penetration☆14May 10, 2024Updated last year
- Toolset to analyse TLS datasets☆12Aug 7, 2019Updated 6 years ago
- ☆52Oct 10, 2025Updated 6 months ago
- Web Crawler for Identifying Entry Points☆11Mar 26, 2024Updated 2 years ago
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Sep 18, 2024Updated last year
- regex Hunter- Fast website endpoint sensitive data and Leaks JS files endpoint API Key Scraper☆12Jun 8, 2024Updated last year
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆37Oct 1, 2025Updated 7 months ago
- Collections of Tools, Bookmarks, and other guides created to aid in OSINT collection☆18Aug 18, 2021Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Image Payload Creating/Injecting tools☆13Jun 6, 2021Updated 4 years ago
- PoCs of (outdated) privilege escalation vulnerability☆12Dec 31, 2024Updated last year
- Randomizes clock when systems boots by adding a few seconds and nanoseconds to enforce the design goal, that the host clock and Gateway/…☆14Feb 27, 2026Updated 2 months ago
- CommandInWiFi: Exploiting SSID Storage in WiFi Scanning for Command Injection☆41Mar 9, 2026Updated 2 months ago
- API to access the Redis database of a BGP Ranking instance.☆17Dec 11, 2017Updated 8 years ago
- BetterDiscord Installer☆10Mar 8, 2019Updated 7 years ago
- Information gathering tool using OSINT and AI☆17Nov 21, 2024Updated last year
- DEV7 is a Game Engine made by I.C.E Développement for Coktel Vision☆17Apr 12, 2026Updated 3 weeks ago
- Powershell Scripts for Blue Team members☆11Dec 1, 2023Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Client side web application build to help Youtubers deal with thousands of comments☆11Apr 29, 2020Updated 6 years ago
- Cloud security tutorials and best practices☆38Mar 20, 2023Updated 3 years ago
- gSAST - Grep Static Analysis Security Tool☆13Mar 30, 2024Updated 2 years ago
- I have created this dashboard to track oscp preparation. I have used several resources and has been mentioned in dashboard. Tjnull's blog…☆13Jul 8, 2022Updated 3 years ago
- Code repository for "Machine Learning For Red Team Hackers".☆42Feb 5, 2020Updated 6 years ago
- ☆14Nov 16, 2024Updated last year
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆19Jun 16, 2021Updated 4 years ago