paulveillard / cybersecurity-exploit-developmentLinks
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Exploit Development.
☆26Updated 2 years ago
Alternatives and similar repositories for cybersecurity-exploit-development
Users that are interested in cybersecurity-exploit-development are comparing it to the libraries listed below
Sorting:
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environments☆13Updated last year
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆26Updated 2 years ago
- Enumeration & fingerprint tool☆24Updated last year
- ☆24Updated 3 months ago
- A collection of 10 network security tools using Scapy for traffic analysis, penetration testing, and network manipulation. Ideal for cybe…☆13Updated 7 months ago
- Red Team Operations Framework☆17Updated 10 months ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆42Updated 3 years ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆39Updated last year
- Cyber Security Club, Offensive Operations Section (Red Team) learning pathway.☆29Updated last year
- OSCP_OSWA_OSED_OSEP_OSWE☆7Updated last year
- ☆20Updated 3 years ago
- It was developed to speed up the processes of SOC Analysts during analysis☆49Updated last year
- Personal notes from Red teamer for Blue/Red/Purple.☆55Updated last year
- A Red Teaming tool focused on profiling the target.☆26Updated 11 months ago
- Monitor your target continuously for new subdomains!☆26Updated 2 years ago
- All the code snippets from my Secure Code Review series on youtube (youtube.com/@muqsitbaig)!☆17Updated 10 months ago
- These are installation notes based on Mayfly's installation notes. They are more streamlined for Vagrant as I did not take the Docker rou…☆28Updated 11 months ago
- nistrich allows you to discover CVEs and their severities belong to IP addresses☆13Updated 2 years ago
- PassMute - A multi featured Password Transmutation/Mutator Tool☆51Updated last year
- ☆20Updated 2 years ago
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.☆21Updated last year
- CIS Benchmark testing of Windows SIEM configuration☆44Updated 2 years ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆47Updated 2 weeks ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated 10 months ago
- An Vulnerability detection and Exploitation tool for CVE-2024-24919☆24Updated last year
- Tactics, Techniques, and Procedures☆25Updated 4 months ago
- Challenge Python☆19Updated 2 years ago
- Ransomware Simulator for Blue team ,Ransomware Simulator for Red team ,Ransomware infographic, open source Anti Ransomware, Ransomware As…☆35Updated 3 years ago
- Automate Auxiliary Module in Metasploit☆20Updated 4 years ago