☆112Nov 24, 2025Updated 5 months ago
Alternatives and similar repositories for IntroToCyberSecurity
Users that are interested in IntroToCyberSecurity are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆19Mar 9, 2022Updated 4 years ago
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆26May 6, 2024Updated 2 years ago
- ☆12Apr 8, 2022Updated 4 years ago
- ☆21Oct 30, 2024Updated last year
- Comprehensive Toolkit for Boosting and Fostering Cybersecurity Compliance☆52Nov 26, 2024Updated last year
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Backstage Parser☆33Jun 23, 2022Updated 3 years ago
- A curated collection of courses, videos, and resources to master network security from the ground up.☆10Jan 6, 2025Updated last year
- ☆20Aug 4, 2019Updated 6 years ago
- FETB : Take URL of File For Analysis using File + ExifTool + Binwalk Commands☆20Feb 2, 2021Updated 5 years ago
- A vulnerable Python/Flask WebApp for educational purpose.☆16Apr 29, 2022Updated 4 years ago
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- OSCP Preparation Guide | Courses, Tricks, Tutorials, Exercises, Machines☆13Oct 17, 2023Updated 2 years ago
- SSH with a ADB port forward☆12Dec 17, 2023Updated 2 years ago
- SWS-Recon is a Python Tool designed to performed Reconnaissance on the given target website- Domain or SubDomain. SWS-Recon collects info…☆21Mar 16, 2023Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Mobile Helper Framework (mhf) is a tool that automates the process of identifying the framework/technology used to create a mobile applic…☆26Dec 23, 2025Updated 4 months ago
- PAKURI-THON is a tool that supports pentesters with various pentesting tools and C4 server (command & control and chat & communication se…☆26Jul 18, 2022Updated 3 years ago
- تجربتي مع اختبار eJPT☆39May 8, 2021Updated 4 years ago
- تجربتي مع اختبار CEH☆29May 8, 2021Updated 4 years ago
- A starter template for your Nuxt projects + various tutorials and examples.☆29Jan 24, 2026Updated 3 months ago
- eLearnSecurity Junior Penetration Tester (eJPT) v2 Notes☆336Oct 19, 2023Updated 2 years ago
- A sample repository showing how to use defineModel in Vue 3.4 with composables to easily and cleanly manage state.☆13Jan 22, 2024Updated 2 years ago
- portfolio website Next.js, React.js, TS, JS, and tailwindcss☆17Jun 29, 2025Updated 10 months ago
- MDiator – A lightweight, fast, and extensible in-process mediator library for .NET with zero runtime reflection and clean CQRS/event supp…☆13Apr 26, 2025Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Mar 24, 2019Updated 7 years ago
- Python based c2 server with a basic beacon server to route the traffic from dummy server to prevent attacker's ip from getting exposed☆25Jul 23, 2019Updated 6 years ago
- Simple Script to Help You Find All Files Has Been Modified, Accessed, and Created In A Range Time.☆27Dec 1, 2022Updated 3 years ago
- study guide for CNA☆15Feb 28, 2020Updated 6 years ago
- A roadmap for learning cyber-security☆59Mar 4, 2021Updated 5 years ago
- ☆13Oct 24, 2024Updated last year
- Grab form parameters easily☆14Dec 11, 2024Updated last year
- Altaqwaa | An Islamic desktop application for Windows, Mac, and Linux operating systems.☆11Mar 18, 2024Updated 2 years ago
- Generate beautiful image from your source code☆16Apr 21, 2023Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Enumerate Callbacks and all Object Types☆16Jan 9, 2023Updated 3 years ago
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 4 years ago
- a breakdown of the Certified Ethical Hacker (CEH v13) course modules along with their key objectives. These modules are structured to al…☆23Jul 13, 2025Updated 9 months ago
- The Adhan, is the Islamic call to prayer, recited by the muezzin at prescribed times of the day.☆14Aug 20, 2012Updated 13 years ago
- Apple BLE proximity pairing message spoofing☆19Aug 29, 2023Updated 2 years ago
- Exotic and uncommon XSS Vectors to hit the target as quickly as possible.☆20May 27, 2020Updated 5 years ago
- A tool that encrypt and hide your data inside your images.☆29Oct 24, 2021Updated 4 years ago