A Project where I try to learn something new every day, and this is a place to track it
☆18Oct 11, 2021Updated 4 years ago
Alternatives and similar repositories for Cyber-Security-Knowledge
Users that are interested in Cyber-Security-Knowledge are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆15Jul 24, 2021Updated 4 years ago
- ☆13Jul 24, 2021Updated 4 years ago
- A collection of notes and rules (Snort/Suricata, Sigma, and YARA) to identify various samples of malware.☆14Sep 7, 2021Updated 4 years ago
- Knowledge Base of Exploitation Techniques☆61Apr 30, 2025Updated 11 months ago
- Some resources to learn about topics in Cyber Security☆80May 11, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- This is my journey into CTF, from my introduction into ethical hacking, covering the tools and competitions that I now engage with and th…☆14Feb 26, 2026Updated last month
- Write-ups of Try Hack me challenge machines☆10Mar 29, 2024Updated 2 years ago
- Runs sshd as a unprivileged user for persistence☆11Jun 23, 2019Updated 6 years ago
- A tool for standing up headless C2 for droppables.☆17Apr 24, 2025Updated 11 months ago
- ☆22Aug 18, 2018Updated 7 years ago
- ☆12Jun 24, 2022Updated 3 years ago
- https://pinkdraconian.gitbook.io/methodology/☆14Aug 24, 2021Updated 4 years ago
- ☆10Mar 27, 2022Updated 4 years ago
- 🤖 TryHackMe Journey - Notes, Challenges & Writeups from the Pre-Security Learning Path☆10Sep 27, 2022Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- OverWatchINT is an Open Source Intelligence and All-in-One Hacking Tool. It's purpose is to reduce the time and efforts of security resea…☆11May 15, 2022Updated 3 years ago
- A compilation of network scanning strategies to find vulnerable devices☆73Nov 6, 2022Updated 3 years ago
- All Shell In One. Generate Reverse Shells and/or generate single code that runs all the payloads.☆10Mar 25, 2021Updated 5 years ago
- Threat Hunter's Knowledge Base☆22Dec 27, 2021Updated 4 years ago
- Stack based buffer overflows attacks made simple. BufferSploit is a semi automated CLI based tool for performing stack based buffer overf…☆21Feb 15, 2021Updated 5 years ago
- OpenBugBounty - https://www.openbugbounty.org/ programs list☆23Mar 15, 2021Updated 5 years ago
- Template project for Offensive Security Exam Documentation☆12Feb 25, 2020Updated 6 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆11Jul 6, 2022Updated 3 years ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆11Aug 3, 2022Updated 3 years ago
- Python for Defenders Course Resources☆20Mar 12, 2026Updated last month
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆12Aug 12, 2021Updated 4 years ago
- Source code of https://blahcat.github.io☆13Oct 6, 2025Updated 6 months ago
- A Python script to find and watch YouTube videos from the terminal without requiring API keys.☆12Feb 28, 2025Updated last year
- ☆17Apr 27, 2025Updated 11 months ago
- SLAM - Simple Local Area Monitor is a lightweight tool for continuous local network monitoring and device discovery.☆18Jul 9, 2025Updated 9 months ago
- A simple password cracker written in Go, designed to search for a specific hashed password in a wordlist.☆13Feb 23, 2024Updated 2 years ago
- Generate image payloads in JS to bypass filters☆39Mar 16, 2021Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Best Tool For instagram bruteforce hacking Tool By EvilDevil☆12Aug 12, 2021Updated 4 years ago
- ☆13Aug 12, 2021Updated 4 years ago
- Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and …☆12Aug 12, 2021Updated 4 years ago
- ☆14Aug 16, 2021Updated 4 years ago
- 🌮 INTERACTIVE reverse shell everywhere! (Particularly digestible with socat multi-handler listener)☆32Nov 3, 2023Updated 2 years ago
- Bugbounty utility to store list of enumerated subdomains into an sqlite3 db [one liner style / Pipe and save]☆29Jan 6, 2021Updated 5 years ago
- ☆44Jun 22, 2021Updated 4 years ago