☆19Mar 9, 2022Updated 3 years ago
Alternatives and similar repositories for OpenSourceCyberSecurity
Users that are interested in OpenSourceCyberSecurity are comparing it to the libraries listed below
Sorting:
- ☆112Nov 24, 2025Updated 3 months ago
- Comprehensive Toolkit for Boosting and Fostering Cybersecurity Compliance☆51Nov 26, 2024Updated last year
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆11Jun 21, 2018Updated 7 years ago
- ☆12Jan 8, 2026Updated last month
- ☆12Jan 28, 2023Updated 3 years ago
- a breakdown of the Certified Ethical Hacker (CEH v13) course modules along with their key objectives. These modules are structured to al…☆19Jul 13, 2025Updated 7 months ago
- CMSC389R course at UMD☆11Oct 2, 2019Updated 6 years ago
- ☆11Oct 17, 2020Updated 5 years ago
- Crosswalk Nessus findings with the CISA Known and Exploited Vulnerabilities (KEV) catalog.☆12Mar 21, 2023Updated 2 years ago
- Resources to learn tech (sharing useful links)☆17Oct 26, 2021Updated 4 years ago
- Pritunl Zero Docker image☆18Nov 12, 2025Updated 3 months ago
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Mar 24, 2019Updated 6 years ago
- Threat Hunting is time consuming enough as it is. Coming up with and tracking metrics to justify your hunt team to the Execs often takes…☆13Dec 7, 2022Updated 3 years ago
- SysCalling is an educational project demonstrating state-of-the-art syscall execution techniques for bypassing user-space EDR controls in…☆14Dec 8, 2024Updated last year
- Learning material for completely newcomers in the field of BOFs☆14Apr 11, 2020Updated 5 years ago
- Simple Python Modular Script to Broke Web Logins☆15Oct 7, 2022Updated 3 years ago
- Colorize Reached Blocks in IDA Pro using DynamoRIO drcov Output☆20Jun 15, 2023Updated 2 years ago
- Threat Simulator for Enterprise Networks☆14May 14, 2022Updated 3 years ago
- Some of the tools we use during vCISO engagements☆17Apr 23, 2022Updated 3 years ago
- A collection of cyber tutorials including Python examples☆17Oct 10, 2022Updated 3 years ago
- A simple and cross-platform Remote Administration Tool written in Ruby☆15Sep 13, 2017Updated 8 years ago
- A Python script to hack parrot drones automatically. It allows to spawn a shell on the drone to control it.☆15Feb 21, 2019Updated 7 years ago
- Material do curso de Hardware Hacking da ACADITI☆23Jan 13, 2020Updated 6 years ago
- ☆19Dec 2, 2024Updated last year
- dvp-pc : keep code☆17Jun 14, 2018Updated 7 years ago
- Flipper Zero applications☆21Sep 24, 2025Updated 5 months ago
- Books☆18Jun 24, 2021Updated 4 years ago
- (AUTOMATIC UDEV DETECTION) work-in-progress launcher for one of the Tegra X1 bootROM exploits☆16Jan 13, 2022Updated 4 years ago
- A curated collection of resources for the zero-trust security model.☆19Jun 10, 2021Updated 4 years ago
- gRPC Based Remote Administration Tool☆20Jun 23, 2023Updated 2 years ago
- Write-ups of All types Bugs☆21Apr 13, 2022Updated 3 years ago
- ☆33Mar 13, 2022Updated 3 years ago
- Cypher Rat : is an android remote tool allows you to control and monitor android phone From your PC☆23May 6, 2022Updated 3 years ago
- Pavlova dispatcher based on live availability of KiwiSDR receivers☆24Nov 14, 2022Updated 3 years ago
- DarkRat source - beware untested source and resources.☆21Dec 7, 2019Updated 6 years ago
- Ensemble-HackTools is an awesome collection of hacking tools.☆28May 8, 2024Updated last year
- Quantum Computing Cheat Sheet☆26Nov 8, 2016Updated 9 years ago
- 12 Weeks, 24 Lessons, IoT for All!☆22Aug 27, 2024Updated last year
- The gse-study repo was assembled to serve as a consolidated, and comprehensive, study solution for the SANS GSE exam.☆25Nov 11, 2018Updated 7 years ago