This repository is an overview of what resources you need in cybersecurity which we called infosec and a collection of hacking tools, resources and references to practice ethical hacking it helps you to make your knowledge more perfect in this domain
☆21Nov 16, 2023Updated 2 years ago
Alternatives and similar repositories for Infosec-Resources
Users that are interested in Infosec-Resources are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- reverse engineering, visual binary analysis☆24Jan 9, 2017Updated 9 years ago
- ☆24Sep 26, 2021Updated 4 years ago
- This tool will quickly search for exploitable binaries with SUID bit set in Linux and will output the method of exploitation from GTFObin…☆26Dec 29, 2020Updated 5 years ago
- This experiment is an example of 3D Audio integration in a virtual world on the Web.☆15Nov 6, 2023Updated 2 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆11Oct 29, 2018Updated 7 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Information Gathering and OSINT Tool☆13Mar 15, 2024Updated 2 years ago
- Malware sample exchange system and API intended for Anti-Virus companies and researchers.☆16Aug 19, 2024Updated last year
- A Python based Recon Tool to search for Storage Buckets☆11Jan 21, 2023Updated 3 years ago
- Square space utilization core for 3d bin packing algorithm☆11Dec 3, 2021Updated 4 years ago
- Source code RDPUploader☆19Dec 27, 2018Updated 7 years ago
- ☆22Jul 27, 2020Updated 5 years ago
- This project is used for deploying a liquidity pool on PancakeSwap.☆10Apr 29, 2021Updated 5 years ago
- ☆14Jul 22, 2013Updated 12 years ago
- ☆13Oct 14, 2017Updated 8 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- This is an implementation of the CVE-2020-0796 aka SMBGhost vulnerability, compatible with the Metasploit Framework☆20Jun 19, 2020Updated 5 years ago
- This Buffer Overflow Toolkit works through FTP, SMTP, POP, HTTP protocols as well file outputs for playlists exploiting customized variab…☆17Nov 12, 2021Updated 4 years ago
- Command List for Hashcat and default keyspaces.☆17Feb 13, 2020Updated 6 years ago
- Hacking Tool!! This Tools help you with ethical hacking, Social media hack, phone info, Gmail attack, phone number attack, user discovery…☆19Dec 23, 2024Updated last year
- A set of extended funcionalities for HTB website☆11Oct 2, 2019Updated 6 years ago
- Code samples of web scraping using Java.☆15Sep 29, 2022Updated 3 years ago
- Volatility Linux Profiles☆27Aug 1, 2014Updated 11 years ago
- Passive JavaScript reconnaissance for penetration testers — bridging Burp Suite traffic into structured, AST-based analysis in VSCode.☆36Feb 5, 2026Updated 3 months ago
- Showcasing the design patterns you can use alongside Model-View-ViewModel (MVVM).☆13Apr 21, 2021Updated 5 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- H0tmCheck: email checking sin ruido, sin basura, solo resultados.☆18Dec 14, 2025Updated 4 months ago
- Read PostgreSQL data files without credentials - forensics, data recovery, and security research tool☆45Apr 14, 2026Updated 3 weeks ago
- Administration tool for GOV.UK PaaS☆18Oct 1, 2025Updated 7 months ago
- Image Payload Creating/Injecting tools☆13Jun 6, 2021Updated 4 years ago
- Code for Hands-on CI/CD for Spring Boot applications using GitHub Actions and AWS Tutorial☆16Apr 14, 2024Updated 2 years ago
- ☆46Apr 3, 2019Updated 7 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆11Jan 6, 2022Updated 4 years ago
- References, tools and sample payloads☆11Sep 16, 2016Updated 9 years ago
- Python Script to access ATT&CK content available in STIX via a public TAXII server☆13Dec 21, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Hatice is an autonomous coding agent orchestration system.☆93Updated this week
- Needed a way to filter all my pwnagotchi handshakes.☆13Feb 8, 2020Updated 6 years ago
- lumiere client☆41Mar 2, 2026Updated 2 months ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Mar 15, 2022Updated 4 years ago
- XSS PoCs to elevate your alert()☆23May 18, 2023Updated 2 years ago
- It's a handy tool to help you analyze malware. You can use this tool to query your malware samples using different hashes or find all oth…☆20Jul 22, 2025Updated 9 months ago
- IDA IDC script to improve Objective-C disassembly output☆21Aug 30, 2012Updated 13 years ago