paulveillard / cybersecurity-exploit-development
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Exploit Development.
☆15Updated 2 years ago
Related projects: ⓘ
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆16Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆24Updated last year
- A collection of awesome framework, libraries, learning tutorials, videos, webcasts, technical resources and cool stuff about Social Engin…☆16Updated 2 years ago
- A collection of awesome software, libraries, documents, books, resources and cool stuff about industrial control systems in cybersecurity…☆24Updated 2 years ago
- ☆14Updated last year
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆31Updated last year
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆32Updated last year
- A BASH Script to automate the installation of the most popular bug bounty tools☆19Updated last year
- Sniffing out well-known threat groups☆28Updated last month
- Cookie - Phishing - Altri strumenti utili - Rendersi Anonimi nel WEB - Messaggistica Sicura☆18Updated 3 months ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, website…☆11Updated 2 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 2 months ago
- New Framework Red Team Operations☆17Updated 3 years ago
- An ongoing collection of awesome penetration testing (pentest) tools, software, libraries, learning tutorials, frameworks, academic and p…☆12Updated last year
- This repository contains the PowerShell script for adding and removing the Sticky Key backdoor on Windows☆28Updated 4 years ago
- Repository of cybersecurity mindmaps☆28Updated last year
- ☆28Updated 3 years ago
- nistrich allows you to discover CVEs and their severities belong to IP addresses☆13Updated last year
- ☆29Updated 3 years ago
- Virus Total Free - IOC parser and report generator☆22Updated last year
- This script identifies Host Header Injection vulnerabilities in a list of URLs or a specific domain, outputting the vulnerable locations …☆15Updated last year
- Programs I Made while learning python for pentesters.☆17Updated 2 years ago
- Automate Auxiliary Module in Metasploit☆19Updated 3 years ago
- ☆18Updated 3 years ago
- Web Hacking Cheat Sheet for Recon | Attacks | Tools & Resources☆16Updated 3 years ago
- Automate All Pivoting System Enumeration with this Bash Script☆10Updated last year
- this nuclei template finds back up files☆16Updated last year
- BlueBox Malware analysis Box and Cyber threat intelligence.☆38Updated 2 years ago
- Pentesting notes☆17Updated last year
- It is a project produced to expose the main logic of OSINT-AI tools offered for sale on the DarkWeb☆28Updated 5 months ago