noluvv / cybersecurity-pdfsLinks
a collection of pdfs i like to read
☆25Updated 2 years ago
Alternatives and similar repositories for cybersecurity-pdfs
Users that are interested in cybersecurity-pdfs are comparing it to the libraries listed below
Sorting:
- Web Hacking Cheat Sheet for Recon | Attacks | Tools & Resources☆25Updated 4 years ago
- ☆50Updated 5 years ago
- Red Team Guides☆144Updated 2 years ago
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆137Updated last year
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆99Updated 2 years ago
- Collection of extra pentest tools for Kali Linux☆112Updated 3 months ago
- Hide an IP address in scripts using hex/decimal/octal conversions☆71Updated 9 months ago
- Automate Scoping, OSINT and Recon assessments.☆98Updated 2 months ago
- Red Teaming tools and techniques☆56Updated 2 years ago
- Fileless "malware" that bypasses Windows Defender using PowerShell and obfuscation☆119Updated last year
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆136Updated last year
- HaxorHandbook is the ultimate cheat sheet for cybersecurity enthusiasts looking to up their game. Our comprehensive guide includes must-h…☆81Updated last year
- Limbo is a Python-based malware that collects sensitive data from a user's computer, such as passwords and system information. It is int…☆49Updated last year
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆140Updated 2 years ago
- ☆29Updated 4 years ago
- A curated list of tools and resources that I use daily as a Purple-Team operator.☆93Updated 7 months ago
- Web Hacking and Red Teaming MindMap☆78Updated 2 weeks ago
- ☆65Updated 2 years ago
- Pentest/Red Team: Resources, repos and scripts.☆78Updated last month
- Red Team Stored XSS SVG phishing-companion tool with the ability to serve a malicious login page, or clone an html page and implement cus…☆30Updated 2 years ago
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆180Updated last year
- A wordlist generator tool, that allows you to supply a set of words, giving you the possibility to craft multiple variations from the giv…☆114Updated 2 years ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146Updated last year
- This is an UNOFFICIAL guide and general list of cheatsheets, references, and walkthroughs aligned with the OffSec OSCP exam process☆31Updated 3 weeks ago
- SpiderCat is an advanced reconnaissance payload that aims to concatanate targets into an Obsidian spider web framework. It allows securit…☆108Updated 2 years ago
- Ethical Hacking Toolkit is a collection of tools, cheat sheets, and resources for Ethical hackers, Penetration Tester, and Security Resea…☆124Updated 3 years ago
- Application with SQL Injection vulnerability and possible privilege escalation. Free vulnerable app for ethical hacking / penetration tes…☆85Updated 3 years ago
- ☆64Updated 5 months ago
- List of Command&Control (C2) software☆46Updated 3 years ago
- RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux 👾☆74Updated 2 years ago