Cyber Security Blog
☆38Jun 30, 2025Updated 8 months ago
Alternatives and similar repositories for secblog
Users that are interested in secblog are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Spawn Up quickly Elastic EDR Panel☆13Jan 29, 2022Updated 4 years ago
- Tool for PDB generation from IDA Pro database☆12Jul 27, 2020Updated 5 years ago
- The wordlists that have been compiled using disclosed reports at HackerOne bug bounty platform☆10Jun 28, 2020Updated 5 years ago
- A program for obfuscating C strings☆36Feb 26, 2023Updated 3 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆14Jun 23, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A web front-end for password cracking and analytics☆16Jan 6, 2019Updated 7 years ago
- ☆11Oct 31, 2021Updated 4 years ago
- A tool that adds reproducible UUIDs to YARA rules☆13Apr 24, 2024Updated last year
- Build wordlists from the common-crawl index☆12Oct 9, 2022Updated 3 years ago
- Package to read out BME280 sensor on Raspberry Pi☆13Nov 27, 2025Updated 4 months ago
- ☆12Apr 21, 2019Updated 6 years ago
- ☆13Mar 15, 2022Updated 4 years ago
- A tool used for encoding and decoding bas64 hash codes in termux.☆21Feb 10, 2021Updated 5 years ago
- Automation for internal Windows Penetrationtest / AD-Security☆19Jun 2, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Collection of Raspberry Pi Zero scripts, tutorials, and projects.☆11Jan 5, 2017Updated 9 years ago
- An tool for search IOT MQTT vulnerable with shodan☆21Sep 15, 2017Updated 8 years ago
- Some Templates for Bash Scripting☆17Sep 30, 2022Updated 3 years ago
- Docker-based platform for conducting MiTM attacks using Responder, NTLMRelayX, and Empire☆21Apr 9, 2025Updated 11 months ago
- A web application to show and filter illustrations included in tweets☆13Aug 14, 2023Updated 2 years ago
- Deepsearch leak database client, as an alternative for pwndb☆15Dec 6, 2022Updated 3 years ago
- 📚 Content & Resources to get started on 🛠 Solidity☆12Sep 20, 2023Updated 2 years ago
- AI Powered Sensitive Information Detection☆20Mar 13, 2024Updated 2 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Apr 16, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- misc brain dump of ansible playbooks☆13Aug 4, 2023Updated 2 years ago
- ☆14Jul 13, 2020Updated 5 years ago
- IoT device scanner with CVE database and many features.☆14Mar 8, 2026Updated 3 weeks ago
- US Government controls formatted for usability☆16Jul 21, 2021Updated 4 years ago
- Package URL implementation for Rust☆14Dec 8, 2025Updated 3 months ago
- AWS security training tasks for your first projects☆12Nov 4, 2024Updated last year
- Linux Enumeration / Privilege escalation tool☆26Sep 3, 2020Updated 5 years ago
- Finding sensitive information in the trimmed parts of cropped images☆29Jan 5, 2022Updated 4 years ago
- An interactive IoT vulnerability scanner.☆15Jan 24, 2019Updated 7 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A new version of libdap that contains both DAP2 and DAP4 support☆13Mar 16, 2026Updated last week
- IOC Collection 2022☆57Mar 7, 2023Updated 3 years ago
- Toponym-based Algorithm for Grouped Geoparsing of Social media☆11Mar 30, 2020Updated 5 years ago
- En este repositorio podrás encontrar los ejercicios del canal @aprendePython3 de Telegram así como sus soluciones.☆10May 20, 2020Updated 5 years ago
- experimental configuration wizard that transforms json and json-schemas into user-experiences☆26Nov 12, 2021Updated 4 years ago
- Python scripts to scan IoT devices for vulnerabilities.☆22May 21, 2018Updated 7 years ago
- Fernbach is a vulnerable API written in the Flask micro web framework. The intent of this API is for testing the OWASP top ten vulnerabil…☆30Feb 4, 2022Updated 4 years ago