☆19Mar 9, 2022Updated 4 years ago
Alternatives and similar repositories for OpenSourceCyberSecurity
Users that are interested in OpenSourceCyberSecurity are comparing it to the libraries listed below
Sorting:
- ☆112Nov 24, 2025Updated 3 months ago
- A tool to check microsofts user real endpoint to get data about a tenant.☆16Feb 6, 2025Updated last year
- A cybersecurity guy's curated list of useful browser bookmarks☆15Mar 6, 2025Updated last year
- Bypass 2FA Instagram☆50Jan 19, 2020Updated 6 years ago
- ☆11Oct 17, 2020Updated 5 years ago
- Pritunl Zero Docker image☆18Nov 12, 2025Updated 4 months ago
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆25May 6, 2024Updated last year
- Mimikatz embedded as classes☆28Oct 25, 2021Updated 4 years ago
- Simple Python Modular Script to Broke Web Logins☆15Oct 7, 2022Updated 3 years ago
- Comprehensive Toolkit for Boosting and Fostering Cybersecurity Compliance☆52Nov 26, 2024Updated last year
- Colorize Reached Blocks in IDA Pro using DynamoRIO drcov Output☆20Jun 15, 2023Updated 2 years ago
- a breakdown of the Certified Ethical Hacker (CEH v13) course modules along with their key objectives. These modules are structured to al…☆21Jul 13, 2025Updated 8 months ago
- Exotic and uncommon XSS Vectors to hit the target as quickly as possible.☆20May 27, 2020Updated 5 years ago
- Learning material for completely newcomers in the field of BOFs☆14Apr 11, 2020Updated 5 years ago
- A Ghidra extension that allows you to run Angr symbolic execution using the Pcode from Ghidra.☆16Nov 11, 2021Updated 4 years ago
- SysCalling is an educational project demonstrating state-of-the-art syscall execution techniques for bypassing user-space EDR controls in…☆14Dec 8, 2024Updated last year
- ☆36Feb 18, 2013Updated 13 years ago
- Threat Simulator for Enterprise Networks☆14May 14, 2022Updated 3 years ago
- A collection of resources to learn Reverse Engineering and Binary Exploitation☆11Nov 11, 2020Updated 5 years ago
- Lists of hacking: Blog, Forums, Telegram channel and all kind of resources in spanish and english.☆15Mar 7, 2021Updated 5 years ago
- ☆18Feb 13, 2026Updated last month
- CMSC389R course at UMD☆11Oct 2, 2019Updated 6 years ago
- ☆40Jan 7, 2022Updated 4 years ago
- A Ghidra script to improve decompiled code readability by re-writing it (Using DeepSeek) in a better way, Along with renaming/assigning v…☆19Oct 8, 2025Updated 5 months ago
- Crosswalk Nessus findings with the CISA Known and Exploited Vulnerabilities (KEV) catalog.☆12Mar 21, 2023Updated 2 years ago
- ☆12Mar 3, 2026Updated 2 weeks ago
- Stego is an open-source and free steganography tool that lets you hide your secret message in an image or audio file. You will not notice…☆153Sep 11, 2021Updated 4 years ago
- Generative AI Governance for Enterprises☆16Dec 29, 2024Updated last year
- Questions to ask about the team and company when you're interviewing for a CISO position☆15Oct 19, 2021Updated 4 years ago
- ☆13Feb 18, 2024Updated 2 years ago
- A collection of cyber tutorials including Python examples☆17Oct 10, 2022Updated 3 years ago
- Schedule of my public security training courses!☆15Apr 13, 2021Updated 4 years ago
- Bot Detection by Building Markov Chain Models of Bots Network Behavior☆16Feb 6, 2021Updated 5 years ago
- Some of the tools we use during vCISO engagements☆17Apr 23, 2022Updated 3 years ago
- ☆29May 10, 2024Updated last year
- ☆49Aug 16, 2016Updated 9 years ago
- An online free tool to edit or preview markdown files created using nextjs & TypeScript 💕☆17Apr 23, 2025Updated 10 months ago
- ☆19Dec 2, 2024Updated last year
- A Python script to hack parrot drones automatically. It allows to spawn a shell on the drone to control it.☆15Feb 21, 2019Updated 7 years ago