nimari / OpenSourceCyberSecurity
☆19Updated 2 years ago
Alternatives and similar repositories for OpenSourceCyberSecurity:
Users that are interested in OpenSourceCyberSecurity are comparing it to the libraries listed below
- ☆109Updated 2 years ago
- Ethical Hacking Toolkit is a collection of tools, cheat sheets, and resources for Ethical hackers, Penetration Tester, and Security Resea…☆114Updated 2 years ago
- Slides for my conference talks☆43Updated last year
- ☆127Updated 2 years ago
- ☆113Updated last year
- This is a repository for network security tools and technologies.☆93Updated 2 years ago
- Compilation of Resources from TCM's Practical Ethical Hacking Udemy Course☆121Updated 2 years ago
- Repository with some necessary information for you to create your PenTest consultancy☆94Updated 2 weeks ago
- OSINT Tools for the Dark Web☆138Updated 7 months ago
- https://shoulderhu.gitbook.io/tryhackme☆29Updated 2 years ago
- SIEM Cheat Sheet☆73Updated last year
- ☆19Updated 2 years ago
- Strumenti di Acquisizione e Analisi di copie Forensi☆145Updated 10 months ago
- PMR - PT & VA Management & Reporting is a collaboration platform for pen-testing. PMR Platform is maintained by @SabrySecurity https://sa…☆12Updated last year
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆130Updated last year
- Collection of notes and resources for the CompTIA PenTest+ exam.☆35Updated 5 years ago
- Tools & Resources for Cyber Security Operations☆211Updated 2 weeks ago
- Real Cyber Security Interview Questions for Various Job Roles☆53Updated 2 years ago
- An OSINT Framework project based on Python☆103Updated 7 months ago
- This is a simple bash script to fix errors with apt update, upgrade MetaSploit and run some upgrades to improve the system usability with…☆99Updated 5 months ago
- ☆78Updated 3 years ago
- Includes quick start guides for Shodan for both IT and ICS/OT assets☆122Updated last year
- Useful resources about phishing email analysis☆77Updated 3 years ago
- A OWASP Based Checklist With 80+ Test Cases☆139Updated 2 years ago
- Regular Expressions List used in Digital Forensic Tasks☆79Updated 11 months ago
- ☆64Updated last year
- This Repo will help you to prepare better for CEH - Practical Exam☆49Updated 10 months ago
- When it comes to exploiting web application security, this is a methodology. Enumeration and Networking guidelines are also listed to hel…☆22Updated 3 years ago
- ☆47Updated 2 years ago
- ☆73Updated 3 years ago