pathakabhi24 / Infosec-ResourcesView external linksLinks
This repository is an overview of what resources you need in cybersecurity which we called infosec and a collection of hacking tools, resources and references to practice ethical hacking it helps you to make your knowledge more perfect in this domain
☆19Nov 16, 2023Updated 2 years ago
Alternatives and similar repositories for Infosec-Resources
Users that are interested in Infosec-Resources are comparing it to the libraries listed below
Sorting:
- Metadefender Core (Metascan v.4 and v.3) analysis module for Viper malware analysis framework☆10Jan 6, 2021Updated 5 years ago
- Debian10-Linux4.19 Hook sys_call_table By IDT☆11May 9, 2020Updated 5 years ago
- Cobalt Strike DNS beacon parser☆11Nov 29, 2021Updated 4 years ago
- reverse engineering, visual binary analysis☆24Jan 9, 2017Updated 9 years ago
- Malware sample exchange system and API intended for Anti-Virus companies and researchers.☆16Aug 19, 2024Updated last year
- ☆24Sep 26, 2021Updated 4 years ago
- Source code RDPUploader☆19Dec 27, 2018Updated 7 years ago
- This repo generally for malware Researcher ("Password: infected")☆19Apr 29, 2025Updated 9 months ago
- Volatility Linux Profiles☆27Aug 1, 2014Updated 11 years ago
- This is an implementation of the CVE-2020-0796 aka SMBGhost vulnerability, compatible with the Metasploit Framework☆19Jun 19, 2020Updated 5 years ago
- This tool will quickly search for exploitable binaries with SUID bit set in Linux and will output the method of exploitation from GTFObin…☆26Dec 29, 2020Updated 5 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Mar 15, 2022Updated 3 years ago
- Openssh backdoor found with a ssh honeypot☆27Jul 22, 2016Updated 9 years ago
- Comprehensive course materials for 'Linux for Cyber Security', covering everything from basic Linux fundamentals to advanced security pra…☆14Sep 28, 2024Updated last year
- Malware detonation platform Polygon integration☆10Aug 1, 2023Updated 2 years ago
- String decryption for Agile.NET packed assemblies.☆37Oct 3, 2021Updated 4 years ago
- Small POC for process ghosting☆40Feb 1, 2022Updated 4 years ago
- A list of notes that I've compiled over time to help with CTF's and the OSCP exam.☆10Dec 29, 2020Updated 5 years ago
- Raspberry Pi Smart Bartender☆14Apr 22, 2022Updated 3 years ago
- ☆10Nov 1, 2021Updated 4 years ago
- A malware sandoxed with gdb☆15Jun 27, 2016Updated 9 years ago
- Publicly available training resources used by Security PS to train application security engineers☆10Feb 16, 2021Updated 4 years ago
- Ransomware Detection Test PowerShell Script☆11Sep 22, 2017Updated 8 years ago
- Android gallery spyware☆11Feb 7, 2023Updated 3 years ago
- ☆44Nov 27, 2023Updated 2 years ago
- Hacking resources for the Exegol project☆42Feb 1, 2026Updated last week
- (Linux Kernel) Stack Monitoring Tool☆48Jan 31, 2022Updated 4 years ago
- Known WannCrypt Bitcoin addresses☆10Jul 17, 2017Updated 8 years ago
- A curated collection of production‑ready Zabbix templates maintained by initMAX (Zabbix Premium Partner & Certified Trainer) for Zabbix 7…☆21Updated this week
- Learning assembly for linux-x86_64☆13Mar 18, 2016Updated 9 years ago
- ☆13Jan 2, 2026Updated last month
- Random tools and utilities for use with the iOS kernel☆10Jan 7, 2013Updated 13 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 6 years ago
- Passive JavaScript reconnaissance for penetration testers — bridging Burp Suite traffic into structured, AST-based analysis in VSCode.☆35Feb 5, 2026Updated last week
- References, tools and sample payloads☆11Sep 16, 2016Updated 9 years ago
- The malsource dataset☆12Aug 31, 2021Updated 4 years ago
- Synchronize properties from your Obsidian notes with a Markwhen timeline file.☆12Sep 20, 2025Updated 4 months ago
- ☆10May 6, 2017Updated 8 years ago
- ☆10Jan 2, 2016Updated 10 years ago