milosilo / port-invadersLinks
Port Invaders is an arcade-style educational game designed to help you learn and memorize common networking port numbers. Whether you're studying for Network+, Security+, OSCP, CEH, A+, MCSA, or any other IT certification, this game offers a fun and interactive way to get familiar with port numbers.
☆12Updated last year
Alternatives and similar repositories for port-invaders
Users that are interested in port-invaders are comparing it to the libraries listed below
Sorting:
- OSINT web scraper for SatNow to extract details about satellite components and subsystem specs for in-depth reconnaissance 🛸☆50Updated 6 months ago
- Tools and Resources for Physical Security Red Teaming☆31Updated 2 months ago
- Sophisticated cyber penetration attacks is a series of advanced techniques, notes and guidance that will help you to prepare in your car…☆32Updated 2 weeks ago
- Doppelgänger is firmware that runs on ESP32 devices that can be embedded within commercially available RFID readers with the intent of ca…☆16Updated 11 months ago
- Source of swisskyrepo.github.io - Public☆23Updated last month
- Place to store my various exposed IoT cam-scanning work and info☆19Updated last year
- Hacker Warz is a text-based hacking simulation game inspired by the retro game "Drug Wars" that was played on graphing calculators back i…☆1Updated last year
- ☆38Updated 2 years ago
- It is a project produced to expose the main logic of OSINT-AI tools offered for sale on the DarkWeb☆34Updated last year
- An OSINT tool for searching DuckDuckGo via Tor using search dorks.☆19Updated last month
- For Public Objects☆21Updated 7 months ago
- A curation of tools presented at DEF CON conference each year, the world's largest hacker con.☆33Updated last year
- Files and Programs for UAV and Drone Cybersecurity Workshop☆31Updated last year
- SkeletonKey is capable of advanced encryption, decryption, and breaking ciphers through various methods. These methods include but are no…☆42Updated last year
- Maltego Transforms for generating screenshots from Websites and URLs☆17Updated 2 years ago
- List of some cybersecurity conferences☆57Updated this week
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆27Updated 10 months ago
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆41Updated 9 months ago
- Cloud Pentesting Resource Collection☆24Updated last year
- Collection of videos of Raids on Cybercriminals☆19Updated 2 months ago
- Card calculator and Proxmark3 Plugin for writing and/or simulating every card type that Doppelgänger Community, Pro, Stealth, and MFAS su…☆20Updated 6 months ago
- Yet Another Mac Changer!!!☆12Updated 2 years ago
- Advanced network security tool for real-time threat detection and C2 communication prevention. Features 70+ detection modules, IOC integr…☆12Updated 11 months ago
- A collection of tools that I use in CTF's or for assessments☆98Updated 4 months ago
- keep watching new bug bounty (vulnerability) postings.☆13Updated last year
- Hardening script for Windows (Domain mode or without domain)☆13Updated last month
- A script to automate keystrokes through a graphical desktop program.☆35Updated 4 months ago
- This is a guide to understand Flag categories for Trace Labs OSINT Search Party CTF events☆29Updated last year
- Rubber Ducky powered by NeoKey☆25Updated last year
- ☆16Updated last year