paulveillard / cybersecurity-malware
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Malware, Rootkits, and botnets in Cybersecurity.
☆9Updated last year
Related projects ⓘ
Alternatives and complementary repositories for cybersecurity-malware
- A collection of awesome framework, libraries, learning tutorials, videos, webcasts, technical resources and cool stuff about Social Engin…☆16Updated 2 years ago
- An ongoing collection of awesome ethical hacking tools, software, libraries, learning tutorials, frameworks, academic and practical resou…☆26Updated last year
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆16Updated 2 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆27Updated 2 years ago
- ☆9Updated 2 years ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆13Updated 8 months ago
- Hackfruit is an easy search tool that finds hacking tools, commands and cheat sheets. It helps cybersecurity learing and trainings, CTFs,…☆21Updated last year
- Tactics, Techniques, and Procedures☆19Updated 8 months ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆13Updated 3 years ago
- web network analyzer☆12Updated 11 months ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆11Updated last year
- Strumenti per Domini - Whois - IP - Data Breach - Email☆12Updated 2 weeks ago
- Another vulnerability scanner☆17Updated last year
- A tool for generating reverse shell payloads on the fly.☆10Updated 2 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆14Updated 3 years ago
- Curated list of ransomware-related resources; awesome style.☆13Updated last year
- Maltego transform with Keskivonfer☆14Updated 4 years ago
- A tool to check for response status codes with ease☆14Updated last year
- BlueTeam, RedTeam, Bug bounty, OSINT, Threat Hunting, Network and Web Recon, Discovery, Enumeration, Vulnerability Mapping, Exploitation,…☆46Updated last week
- CloudDefense.ai is an automated web application security testing tool that audits your web applications by checking for vulnerabilities l…☆47Updated 3 months ago
- OpenAI Security Console - Python3 AI-powered Cybersecurity Framework☆13Updated last year
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆31Updated 2 years ago
- Yet another powerful payload encoder/decoder☆12Updated 2 years ago
- Search Google Dorks like Chad. / Broken link hijacking tool.☆24Updated last month
- Hax is a mini-tool with really useful hacking tools.☆16Updated last year
- Payloads and Lists☆20Updated 4 years ago
- This is a Simple reg Backdoor for Windows shell Hacking. You can fully compromise the target machine with this TOOL . For Advance backdoo…☆13Updated 4 years ago
- An OSINT tool to search for accounts by username in social networks.☆16Updated 2 years ago