☆19Mar 9, 2022Updated 4 years ago
Alternatives and similar repositories for OpenSourceCyberSecurity
Users that are interested in OpenSourceCyberSecurity are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆111Nov 24, 2025Updated 4 months ago
- ☆10Mar 31, 2024Updated 2 years ago
- A tool to check microsofts user real endpoint to get data about a tenant.☆16Feb 6, 2025Updated last year
- Pritunl Zero Docker image☆18Nov 12, 2025Updated 4 months ago
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆24May 6, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆11Jun 21, 2018Updated 7 years ago
- Mimikatz embedded as classes☆28Oct 25, 2021Updated 4 years ago
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Mar 24, 2019Updated 7 years ago
- Simple Python Modular Script to Broke Web Logins☆15Oct 7, 2022Updated 3 years ago
- Comprehensive Toolkit for Boosting and Fostering Cybersecurity Compliance☆52Nov 26, 2024Updated last year
- This firmware downgrader was not made by me. This repo is a compilation of information and software needed to downgrade to 4.31.20 for th…☆13Sep 21, 2017Updated 8 years ago
- Config files for my GitHub profile.☆464Apr 2, 2026Updated last week
- ☆11Oct 17, 2020Updated 5 years ago
- Colorize Reached Blocks in IDA Pro using DynamoRIO drcov Output☆20Jun 15, 2023Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- a breakdown of the Certified Ethical Hacker (CEH v13) course modules along with their key objectives. These modules are structured to al…☆23Jul 13, 2025Updated 8 months ago
- Exotic and uncommon XSS Vectors to hit the target as quickly as possible.☆20May 27, 2020Updated 5 years ago
- Learning material for completely newcomers in the field of BOFs☆16Apr 11, 2020Updated 5 years ago
- ☆12Jan 28, 2023Updated 3 years ago
- Priv8 Tools Software Mass Dork Auto Exploit.☆12Feb 1, 2023Updated 3 years ago
- ☆36Feb 18, 2013Updated 13 years ago
- Threat Simulator for Enterprise Networks☆14May 14, 2022Updated 3 years ago
- A collection of resources to learn Reverse Engineering and Binary Exploitation☆11Nov 11, 2020Updated 5 years ago
- Lists of hacking: Blog, Forums, Telegram channel and all kind of resources in spanish and english.☆15Mar 7, 2021Updated 5 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Write-ups of All types Bugs☆21Apr 13, 2022Updated 3 years ago
- ☆40Jan 7, 2022Updated 4 years ago
- A Ghidra script to improve decompiled code readability by re-writing it (Using DeepSeek) in a better way, Along with renaming/assigning v…☆19Oct 8, 2025Updated 6 months ago
- Converts any payload for fusee to an sx os boot.dat☆11Oct 3, 2024Updated last year
- Crosswalk Nessus findings with the CISA Known and Exploited Vulnerabilities (KEV) catalog.☆12Mar 21, 2023Updated 3 years ago
- A modified version of Shizuku for the quest 3 [WIP]☆20Jul 8, 2024Updated last year
- Stego is an open-source and free steganography tool that lets you hide your secret message in an image or audio file. You will not notice…☆153Sep 11, 2021Updated 4 years ago
- ☆15Jan 28, 2020Updated 6 years ago
- A simple and cross-platform Remote Administration Tool written in Ruby☆15Sep 13, 2017Updated 8 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆120May 26, 2025Updated 10 months ago
- Resources to learn tech (sharing useful links)☆17Oct 26, 2021Updated 4 years ago
- A tool that can scramble any file by rearranging the bytes it consists of—rendering it unreadable; and also unscramble any scrambled file…☆15May 11, 2021Updated 4 years ago
- Bot Detection by Building Markov Chain Models of Bots Network Behavior☆16Feb 6, 2021Updated 5 years ago
- Some of the tools we use during vCISO engagements☆17Apr 23, 2022Updated 3 years ago
- ☆62Jun 18, 2025Updated 9 months ago
- ☆49Aug 16, 2016Updated 9 years ago