ouspg / SecurityEngineeringLinks
Repository for the Oulu University Security Engineering course.
☆13Updated 2 months ago
Alternatives and similar repositories for SecurityEngineering
Users that are interested in SecurityEngineering are comparing it to the libraries listed below
Sorting:
- This is repo with my custom zsh completion files for pentesting tools, which do not exist in zsh and oh-my-zsh by default☆13Updated last month
- Master of Science in Cybersecurity, Sapienza University of Rome.☆54Updated last year
- List of sources for cybersecurity news☆39Updated 2 years ago
- A repository for maintaining a list of the top domains based on multiple lists☆22Updated 3 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆35Updated 4 years ago
- List of GREP modifications and alternatives for a variety of purposes☆132Updated 9 months ago
- Hacker calendar 2024 in high resolution + template + some editing tips☆23Updated last year
- A meta-scan tool used to kick off a number of command-line security tools during VA/PT work.☆23Updated 3 years ago
- This repository contains the files that provide the upload functionality in the IIS Server☆34Updated 4 years ago
- Awesome Operational Security resources☆47Updated 8 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆66Updated 4 months ago
- Scripts I have written to perform various IT Security admin tasks. From validating findings to performing automated attacks☆21Updated 8 months ago
- Collection of CVEs from Sick Codes, or collaborations on https://sick.codes security research & advisories.☆90Updated 3 years ago
- This repository contains the PowerShell script for adding and removing the Sticky Key backdoor on Windows☆35Updated 5 years ago
- Get trails tool: Get all urls indexed of target☆22Updated 4 years ago
- ARP Spoofing Defender is a project designed to protect local networks from ARP Spoofing attacks. ARP Spoofing Defender provides mechanism…☆22Updated last year
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆35Updated last week
- Various exploits☆10Updated 8 years ago
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆31Updated 2 years ago
- Simple username generator based on a list of name and surname☆13Updated 4 years ago
- Reconstruct javascript from a sourcemap in bash☆39Updated 4 years ago
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆83Updated 5 years ago
- A Network Automation framework focused on Cyber-Security☆48Updated 2 years ago
- 🖥️ A reveal.js website for presenting the cyber security basics to humans☆33Updated 2 years ago
- Wordlist generated using leaked databases, Pipal, and CUPP.☆35Updated 7 years ago
- Scripts useful in cracking the Vulnhub Lab named View2aKill: 1☆26Updated 5 years ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆13Updated 4 years ago
- personal fork of OSINT tool recon-ng☆18Updated 7 years ago
- URL / IP / Email defanging with Javascript. Make IoC harmless.☆30Updated last year
- Light and containerized version of Kali Linux with Docker containing only the useful tools and allowing to be launched on the fly☆28Updated 5 years ago