noluvv / cybersecurity-pdfsLinks
a collection of pdfs i like to read
☆25Updated 2 years ago
Alternatives and similar repositories for cybersecurity-pdfs
Users that are interested in cybersecurity-pdfs are comparing it to the libraries listed below
Sorting:
- A curated list of tools and resources that I use daily as a Purple-Team operator.☆93Updated 8 months ago
- Single Python Project enabling quick infrastructure loading (SMB Servers, HTTP File Server, FTP, Webpage, NetScanner)☆13Updated 2 years ago
- Web Hacking Cheat Sheet for Recon | Attacks | Tools & Resources☆25Updated 4 years ago
- This is an UNOFFICIAL guide and general list of cheatsheets, references, and walkthroughs aligned with the OffSec OSCP exam process☆31Updated last month
- ☆65Updated 2 years ago
- HaxorHandbook is the ultimate cheat sheet for cybersecurity enthusiasts looking to up their game. Our comprehensive guide includes must-h…☆79Updated last year
- Red Team Guides☆144Updated 2 years ago
- Pentest/Red Team: Resources, repos and scripts.☆79Updated 2 months ago
- It is a project produced to expose the main logic of OSINT-AI tools offered for sale on the DarkWeb☆37Updated last year
- A curated list wordlists for bruteforcing and fuzzing☆85Updated 2 years ago
- ☆29Updated 4 years ago
- Automate Scoping, OSINT and Recon assessments.☆103Updated last week
- ☆25Updated 3 years ago
- Collection of extra pentest tools for Kali Linux☆113Updated 4 months ago
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆99Updated 2 years ago
- Red Teaming tools and techniques☆56Updated 2 years ago
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆137Updated last year
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆139Updated 2 years ago
- Challenge Python☆19Updated 2 years ago
- Web Hacking and Red Teaming MindMap☆78Updated last month
- List of Command&Control (C2) software☆47Updated 3 years ago
- Python Gmail User Enumeration Tool☆15Updated 6 months ago
- Internal Network Penetration Test Playbook☆20Updated 4 years ago
- Powershell tools used for Red Team / Pentesting.☆80Updated 2 years ago
- OSCP Study Guide☆42Updated 3 years ago
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆35Updated 2 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆33Updated 3 years ago
- Collection of scripts and other content to make the life of bots and script-kiddies as hard as possible☆45Updated 3 months ago
- Fileless "malware" that bypasses Windows Defender using PowerShell and obfuscation☆119Updated 2 years ago
- ☆34Updated 2 years ago