murchie85 / cyber_compendiumLinks
A one stop shop for all cyber tooling, frameworks and hacking methodologies
☆11Updated 3 years ago
Alternatives and similar repositories for cyber_compendium
Users that are interested in cyber_compendium are comparing it to the libraries listed below
Sorting:
- ☆12Updated 4 years ago
- SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types i…☆14Updated 9 years ago
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆16Updated 3 years ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆19Updated last year
- An Open Source Intelligence Framework to investigate and keep track of the investigation of a certain individual☆15Updated last year
- This is a simple Python script that connects to a MISP instance and retrieves attributes of specific types (such as IP addresses, URLs, a…☆16Updated 2 years ago
- Resource links (video, slides & code) for my conference talks | presentations | workshops☆14Updated 5 months ago
- CERT Australia Cyber Threat Intelligence (CTI) Toolkit☆14Updated 7 years ago
- Notes and Commands for CTFs☆22Updated 5 years ago
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Updated 6 years ago
- A collection of awesome framework, libraries, learning tutorials, videos, webcasts, technical resources and cool stuff about Social Engin…☆19Updated 3 years ago
- SocialPwned is an OSINT tool that allows to get the emails, from a target, published in social networks such as Instagram, Linkedin and T…☆11Updated 2 years ago
- Simple Phishing Toolkit is a super easy to install and use phishing framework built to help Information Security professionals find human…☆26Updated 7 years ago
- ☆11Updated 4 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆14Updated 5 years ago
- Hashes of infamous malware☆26Updated last year
- RATs library 2003 to present☆14Updated last year
- Admin for☆17Updated 7 years ago
- Virus Total Free - IOC parser and report generator☆23Updated 2 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Updated 3 years ago
- ☆19Updated 3 years ago
- A meta-scan tool used to kick off a number of command-line security tools during VA/PT work.☆23Updated 3 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆14Updated 8 years ago
- buffer overflow examples☆22Updated 7 years ago
- Automated Pentest Recon Scanner☆14Updated 7 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Updated 3 years ago
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆32Updated 2 years ago
- A Simple Log4j Indicator of Compromise Linux Detector☆15Updated 3 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Updated 4 years ago
- Find open databases - Powered by Binaryedge.io☆15Updated 5 years ago