☆19Mar 9, 2022Updated 4 years ago
Alternatives and similar repositories for OpenSourceCyberSecurity
Users that are interested in OpenSourceCyberSecurity are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆112Nov 24, 2025Updated 5 months ago
- ☆10Mar 31, 2024Updated 2 years ago
- A tool to check microsofts user real endpoint to get data about a tenant.☆16Feb 6, 2025Updated last year
- A cybersecurity guy's curated list of useful browser bookmarks☆15Mar 6, 2025Updated last year
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆26May 6, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆11Jun 21, 2018Updated 7 years ago
- ☆13Mar 29, 2021Updated 5 years ago
- Mimikatz embedded as classes☆28Oct 25, 2021Updated 4 years ago
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Mar 24, 2019Updated 7 years ago
- Simple Python Modular Script to Broke Web Logins☆15Oct 7, 2022Updated 3 years ago
- Comprehensive Toolkit for Boosting and Fostering Cybersecurity Compliance☆52Nov 26, 2024Updated last year
- Config files for my GitHub profile.☆479Apr 24, 2026Updated last week
- Colorize Reached Blocks in IDA Pro using DynamoRIO drcov Output☆20Jun 15, 2023Updated 2 years ago
- ☆18Feb 13, 2026Updated 2 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- a breakdown of the Certified Ethical Hacker (CEH v13) course modules along with their key objectives. These modules are structured to al…☆23Jul 13, 2025Updated 9 months ago
- Exotic and uncommon XSS Vectors to hit the target as quickly as possible.☆20May 27, 2020Updated 5 years ago
- Learning material for completely newcomers in the field of BOFs☆16Apr 11, 2020Updated 6 years ago
- Threat Hunting is time consuming enough as it is. Coming up with and tracking metrics to justify your hunt team to the Execs often takes…☆13Dec 7, 2022Updated 3 years ago
- ☆12Jan 28, 2023Updated 3 years ago
- A Ghidra extension that allows you to run Angr symbolic execution using the Pcode from Ghidra.☆16Nov 11, 2021Updated 4 years ago
- Priv8 Tools Software Mass Dork Auto Exploit.☆12Feb 1, 2023Updated 3 years ago
- ☆36Feb 18, 2013Updated 13 years ago
- ☆34Mar 4, 2019Updated 7 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Threat Simulator for Enterprise Networks☆14May 14, 2022Updated 3 years ago
- CMSC389R course at UMD☆11Oct 2, 2019Updated 6 years ago
- A Ghidra script to improve decompiled code readability by re-writing it (Using DeepSeek) in a better way, Along with renaming/assigning v…☆19Oct 8, 2025Updated 6 months ago
- ☆41Jan 7, 2022Updated 4 years ago
- Crosswalk Nessus findings with the CISA Known and Exploited Vulnerabilities (KEV) catalog.☆12Mar 21, 2023Updated 3 years ago
- A modified version of Shizuku for the quest 3 [WIP]☆20Jul 8, 2024Updated last year
- ☆12Apr 8, 2026Updated 3 weeks ago
- Generative AI Governance for Enterprises☆16Dec 29, 2024Updated last year
- Questions to ask about the team and company when you're interviewing for a CISO position☆15Oct 19, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A collection of cyber tutorials including Python examples☆17Oct 10, 2022Updated 3 years ago
- A simple and cross-platform Remote Administration Tool written in Ruby☆15Sep 13, 2017Updated 8 years ago
- Schedule of my public security training courses!☆15Apr 13, 2021Updated 5 years ago
- Bot Detection by Building Markov Chain Models of Bots Network Behavior☆16Feb 6, 2021Updated 5 years ago
- ☆29May 10, 2024Updated last year
- ☆49Aug 16, 2016Updated 9 years ago
- ☆19Dec 2, 2024Updated last year