A Project where I try to learn something new every day, and this is a place to track it
☆18Oct 11, 2021Updated 4 years ago
Alternatives and similar repositories for Cyber-Security-Knowledge
Users that are interested in Cyber-Security-Knowledge are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A collection of notes and rules (Snort/Suricata, Sigma, and YARA) to identify various samples of malware.☆14Sep 7, 2021Updated 4 years ago
- Knowledge Base of Exploitation Techniques☆60Apr 30, 2025Updated 10 months ago
- Some resources to learn about topics in Cyber Security☆80May 11, 2024Updated last year
- This is my journey into CTF, from my introduction into ethical hacking, covering the tools and competitions that I now engage with and th…☆14Feb 26, 2026Updated 3 weeks ago
- Write-ups of Try Hack me challenge machines☆10Mar 29, 2024Updated last year
- Projects that show my knowledge and experience of Cyber Security.☆15Jan 27, 2022Updated 4 years ago
- PwnWiki - The notes section of the pentesters mind.☆11Nov 16, 2016Updated 9 years ago
- Runs sshd as a unprivileged user for persistence☆11Jun 23, 2019Updated 6 years ago
- Exploits for different vulnerabilities☆13Nov 29, 2021Updated 4 years ago
- ☆22Aug 18, 2018Updated 7 years ago
- ☆12Jun 24, 2022Updated 3 years ago
- ☆10Mar 27, 2022Updated 3 years ago
- 🤖 TryHackMe Journey - Notes, Challenges & Writeups from the Pre-Security Learning Path☆10Sep 27, 2022Updated 3 years ago
- A compilation of network scanning strategies to find vulnerable devices☆73Nov 6, 2022Updated 3 years ago
- All Shell In One. Generate Reverse Shells and/or generate single code that runs all the payloads.☆10Mar 25, 2021Updated 4 years ago
- Threat Hunter's Knowledge Base☆22Dec 27, 2021Updated 4 years ago
- OpenBugBounty - https://www.openbugbounty.org/ programs list☆23Mar 15, 2021Updated 5 years ago
- Template project for Offensive Security Exam Documentation☆12Feb 25, 2020Updated 6 years ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- ☆11Aug 3, 2022Updated 3 years ago
- A reconnaissance tool for ethical hackers written in RUST☆21Apr 8, 2024Updated last year
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆12Aug 12, 2021Updated 4 years ago
- Source code of https://blahcat.github.io☆13Oct 6, 2025Updated 5 months ago
- A Python script to find and watch YouTube videos from the terminal without requiring API keys.☆12Feb 28, 2025Updated last year
- A simple password cracker written in Go, designed to search for a specific hashed password in a wordlist.☆13Feb 23, 2024Updated 2 years ago
- Generate image payloads in JS to bypass filters☆39Mar 16, 2021Updated 5 years ago
- ☆13Aug 12, 2021Updated 4 years ago
- ☆14Aug 16, 2021Updated 4 years ago
- My (newer) Emacs configuration☆14Sep 14, 2025Updated 6 months ago
- Bugbounty utility to store list of enumerated subdomains into an sqlite3 db [one liner style / Pipe and save]☆29Jan 6, 2021Updated 5 years ago
- ☆12May 25, 2022Updated 3 years ago
- This small script can download or update all the GitHub repo of your choice.☆22Apr 13, 2024Updated last year
- Xss payload for bypassing waf☆18Apr 18, 2020Updated 5 years ago
- Machine Learning with Time Series data☆19Aug 31, 2019Updated 6 years ago
- A list of resources I collected during my journey into cybersecurity☆35Oct 9, 2021Updated 4 years ago
- Calculate the domain age with python script☆11Mar 27, 2018Updated 7 years ago
- 🍕 Contribute to open source and win Goodies from Hacktoberfest !☆10Aug 4, 2023Updated 2 years ago
- Files related to works published in Black Mass☆10Sep 16, 2023Updated 2 years ago
- ☆10Oct 12, 2021Updated 4 years ago