This repository is an overview of what resources you need in cybersecurity which we called infosec and a collection of hacking tools, resources and references to practice ethical hacking it helps you to make your knowledge more perfect in this domain
☆20Nov 16, 2023Updated 2 years ago
Alternatives and similar repositories for Infosec-Resources
Users that are interested in Infosec-Resources are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Cobalt Strike DNS beacon parser☆11Nov 29, 2021Updated 4 years ago
- Metadefender Core (Metascan v.4 and v.3) analysis module for Viper malware analysis framework☆10Jan 6, 2021Updated 5 years ago
- reverse engineering, visual binary analysis☆24Jan 9, 2017Updated 9 years ago
- This tool will quickly search for exploitable binaries with SUID bit set in Linux and will output the method of exploitation from GTFObin…☆26Dec 29, 2020Updated 5 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆11Oct 29, 2018Updated 7 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ServiceDroid is an Android application built to assist Jehovah's Witnesses doing volunteer work.☆21Jan 26, 2016Updated 10 years ago
- This repo generally for malware Researcher ("Password: infected")☆19Feb 24, 2026Updated last month
- JNFP: a robust and open-source nofit polygon generator library in Java.☆10Sep 30, 2016Updated 9 years ago
- Information Gathering and OSINT Tool☆13Mar 15, 2024Updated 2 years ago
- KaliPAKU is a training tool for penetration testing using Kali Linux. It is designed to help security professionals and engineers improve…☆37Jul 31, 2023Updated 2 years ago
- A Python based Recon Tool to search for Storage Buckets☆11Jan 21, 2023Updated 3 years ago
- Webshell with the newest, easiest, and shortest code and technique.☆10Oct 23, 2021Updated 4 years ago
- ☆20Jul 9, 2020Updated 5 years ago
- Hacking resources for the Exegol project☆43Mar 7, 2026Updated 2 weeks ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆22Jul 27, 2020Updated 5 years ago
- ☆14Jul 22, 2013Updated 12 years ago
- Email OSINT and password breach hunting. Use h8mail to find passwords through different breach and reconnaissance services, or the infamo…☆10Jun 12, 2019Updated 6 years ago
- This is an implementation of the CVE-2020-0796 aka SMBGhost vulnerability, compatible with the Metasploit Framework☆20Jun 19, 2020Updated 5 years ago
- Hacking Tool!! This Tools help you with ethical hacking, Social media hack, phone info, Gmail attack, phone number attack, user discovery…☆17Dec 23, 2024Updated last year
- Palletier is a Python implementation of the solution for the distributer's pallet packing problem☆14Mar 11, 2026Updated 2 weeks ago
- A set of extended funcionalities for HTB website☆11Oct 2, 2019Updated 6 years ago
- Showcasing the design patterns you can use alongside Model-View-ViewModel (MVVM).☆13Apr 21, 2021Updated 4 years ago
- Volatility Linux Profiles☆27Aug 1, 2014Updated 11 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆41Updated this week
- ☆18Updated this week
- This is python openCV code which uses optical flow tracker to track the person when one entered or left the room☆12Jul 9, 2021Updated 4 years ago
- Administration tool for GOV.UK PaaS☆18Oct 1, 2025Updated 5 months ago
- Headless voice interface for the Pi Coding Agent☆46Feb 13, 2026Updated last month
- ☆46Apr 3, 2019Updated 6 years ago
- References, tools and sample payloads☆11Sep 16, 2016Updated 9 years ago
- LFIter2 Local File Include (LFI) Tool - Auto File Extractor & Username Bruteforcer☆16Nov 11, 2016Updated 9 years ago
- Openssh backdoor found with a ssh honeypot☆27Jul 22, 2016Updated 9 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- lumiere client☆35Mar 2, 2026Updated 3 weeks ago
- A SQL migration tool for many databases☆12Feb 1, 2026Updated last month
- It's a handy tool to help you analyze malware. You can use this tool to query your malware samples using different hashes or find all oth…☆20Jul 22, 2025Updated 8 months ago
- Comprehensive course materials for 'Linux for Cyber Security', covering everything from basic Linux fundamentals to advanced security pra…☆16Sep 28, 2024Updated last year
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Mar 15, 2022Updated 4 years ago
- XSS PoCs to elevate your alert()☆22May 18, 2023Updated 2 years ago
- ☆26Mar 27, 2024Updated 2 years ago