☆38May 30, 2025Updated 9 months ago
Alternatives and similar repositories for Zero2Hero
Users that are interested in Zero2Hero are comparing it to the libraries listed below
Sorting:
- This is Same as Burpsuite Collaborator | Free | Burpsuite Collaborator Server☆12Jun 27, 2025Updated 8 months ago
- Forensic tool for extracting and analyzing Google DriveFS cached files and metadata.☆19May 9, 2025Updated 9 months ago
- Blogs, Tools and other available resources for source code review.☆10Nov 18, 2021Updated 4 years ago
- Automatically deactivate leaked AWS access keys for IAM users flagged by the AWSCompromisedKeyQuarantineV* policy☆23Nov 23, 2024Updated last year
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.☆18Jun 16, 2025Updated 8 months ago
- Guide on buying and setting up your fully capable Jellyfin media client for your hometheater☆19Jun 9, 2025Updated 8 months ago
- Deep Dork Web is a browser-based tool designed to automate Google Dork searches for ethical security research. It supports advanced queri…☆19Mar 13, 2025Updated 11 months ago
- ☆15May 21, 2019Updated 6 years ago
- KQLIntel is a browser-based tool that uses LLMs to convert threat intelligence reports into actionable Kusto Query Language (KQL) queries…☆29Aug 4, 2025Updated 7 months ago
- CloudSec Tools is a curated collection of open-source cloud security tools, helping security professionals, researchers, and engineers fi…☆21Feb 19, 2026Updated 2 weeks ago
- A Kubernetes Forensic Collection Framework for Azure Kubernetes Service☆41Feb 9, 2026Updated 3 weeks ago
- Invictus Threat Intelligence: IOCs and TTPs from blogs, research and more☆30Nov 26, 2025Updated 3 months ago
- CTF and Bug Bounty Hunting WriteUps.☆21Feb 20, 2026Updated 2 weeks ago
- A recon tool for GCP Service Account Keys that requires no permissions☆27Apr 14, 2025Updated 10 months ago
- When Your Vision Reaches Beyond IAM Boundary Scope in AWS Cloud☆45Dec 7, 2025Updated 2 months ago
- Burp or Burp Suite is a set of tools used for penetration testing of web applications. It is developed by the company named Portswigger.☆23Dec 18, 2024Updated last year
- An offensive toolkit for restless guests #DEFCON33☆53Aug 11, 2025Updated 6 months ago
- 🛡️ SIGMA Detection Engineering Platform A comprehensive AI-powered detection engineering platform for security teams to explore MITRE AT…☆46Jun 28, 2025Updated 8 months ago
- macOS Artifacts☆33Mar 2, 2025Updated last year
- Threat feeds designed to extract adversarial TTPs and IOCs, using: ✨AI✨☆70Updated this week
- 🚀 CSRFShark - a utility for manipulating cross-site request forgery attacks☆36Sep 12, 2023Updated 2 years ago
- A comprehensive guide to using AI technologies safely while protecting your privacy. Covers self-hosted solutions, popular AI services, b…☆45May 1, 2025Updated 10 months ago
- Laravel RCE Exploitation Toolkit☆56Nov 8, 2025Updated 3 months ago
- Penetration Testing Interview Questions☆53Apr 15, 2022Updated 3 years ago
- ☆55Jan 19, 2026Updated last month
- ☆52Aug 19, 2025Updated 6 months ago
- Collect IAM information from all your AWS organization, accounts, and resources.☆86Updated this week
- kubernetes-for-soc aims to fast-track the learning curve for SOC analysts by enabling them to swiftly grasp the essential concepts and kn…☆56Dec 18, 2023Updated 2 years ago
- JamfHound is a python3 project designed to collect and identify attack paths in Jamf Pro tenants based on existing object permissions by …☆121Sep 2, 2025Updated 6 months ago
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆78Jan 26, 2026Updated last month
- BloodHound PowerShell client☆77Dec 10, 2025Updated 2 months ago
- Hashcat WPA/WPA2 server☆71Mar 14, 2025Updated 11 months ago
- A cheatsheet containing AWS CloudTrail events that can be used for Incident Response purposes or Detection Engineering.☆80Jan 6, 2026Updated last month
- The Art of Pivoting - Techniques for Intelligence Analysts to Discover New Relationships in a Complex World☆159Dec 31, 2025Updated 2 months ago
- Experiments with OpenWrt + Hi35xx and other SoC's☆83Aug 16, 2022Updated 3 years ago
- Apache Spark Shell Command Injection Vulnerability☆89Sep 7, 2022Updated 3 years ago
- List of awesome projects powered by fal.ai☆109Jul 5, 2025Updated 8 months ago
- A malicious OAuth application that can be leveraged for both internal and external phishing attacks targeting Microsoft Azure and Office3…☆168Jul 31, 2025Updated 7 months ago
- Beacon Object File (BOF) to obtain Entra tokens via authcode flow.☆124Jan 17, 2026Updated last month