noluvv / cybersecurity-pdfsLinks
a collection of pdfs i like to read
☆25Updated 2 years ago
Alternatives and similar repositories for cybersecurity-pdfs
Users that are interested in cybersecurity-pdfs are comparing it to the libraries listed below
Sorting:
- ☆65Updated 2 years ago
- Web Hacking Cheat Sheet for Recon | Attacks | Tools & Resources☆25Updated 4 years ago
- Red Team Guides☆142Updated last year
- Collection of extra pentest tools for Kali Linux☆110Updated 2 months ago
- A curated list of tools and resources that I use daily as a Purple-Team operator.☆91Updated 6 months ago
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆134Updated last year
- Pentest/Red Team: Resources, repos and scripts.☆78Updated last week
- This is an UNOFFICIAL guide and general list of cheatsheets, references, and walkthroughs aligned with the OffSec OSCP exam process☆30Updated 2 years ago
- ☆50Updated 5 years ago
- HaxorHandbook is the ultimate cheat sheet for cybersecurity enthusiasts looking to up their game. Our comprehensive guide includes must-h…☆80Updated last year
- Red Teaming tools and techniques☆55Updated 2 years ago
- Automate Scoping, OSINT and Recon assessments.☆99Updated 3 weeks ago
- Limbo is a Python-based malware that collects sensitive data from a user's computer, such as passwords and system information. It is int…☆49Updated last year
- Web Hacking and Red Teaming MindMap☆75Updated this week
- Some HTB, THM, CTF, Penetration Testing, cyber security related resource and writeups☆25Updated 5 months ago
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆136Updated last year
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆141Updated 2 years ago
- Challenge Python☆19Updated 2 years ago
- SpiderCat is an advanced reconnaissance payload that aims to concatanate targets into an Obsidian spider web framework. It allows securit…☆106Updated 2 years ago
- List of Command&Control (C2) software☆45Updated 3 years ago
- ☆25Updated 2 years ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆85Updated 2 years ago
- A compilation of important commands, files, and tools used in Pentesting☆51Updated 2 years ago
- It is a project produced to expose the main logic of OSINT-AI tools offered for sale on the DarkWeb☆36Updated last year
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- Ethical Hacking Toolkit is a collection of tools, cheat sheets, and resources for Ethical hackers, Penetration Tester, and Security Resea…☆123Updated 3 years ago
- A cheatsheet of tools and commands that I use to pentest Active Directory.☆52Updated 3 years ago
- A toolkit for your red team operations☆33Updated 4 years ago
- Hide an IP address in scripts using hex/decimal/octal conversions☆71Updated 7 months ago
- Tools and Resources for Physical Security Red Teaming☆46Updated last week