paulveillard / cybersecurity-malware
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Malware, Rootkits, and botnets in Cybersecurity.
☆10Updated last year
Alternatives and similar repositories for cybersecurity-malware:
Users that are interested in cybersecurity-malware are comparing it to the libraries listed below
- A collection of awesome framework, libraries, learning tutorials, videos, webcasts, technical resources and cool stuff about Social Engin…☆17Updated 3 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆27Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆16Updated 2 years ago
- A collection of cybsecurity tools, software, libraries, learning tutorials, frameworks, academic and practical resources in security.☆12Updated 10 months ago
- Strumenti per Domini - Whois - IP - Data Breach - Email☆14Updated 2 months ago
- Another vulnerability scanner☆17Updated last year
- Fuzz for hidden proxies, vhosts, and URLs☆16Updated 3 years ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7Updated 2 years ago
- Hax is a mini-tool with really useful hacking tools.☆17Updated last year
- Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152☆18Updated 2 years ago
- An Open Source Intelligence Framework to investigate and keep track of the investigation of a certain individual☆15Updated last year
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆32Updated 2 years ago
- Install an arsenal of OSINT tools by running IntelBox on your Debian VM or OS☆12Updated 2 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆13Updated 3 years ago
- In this repository, I will collect quick and simple code examples that use Python to automate various #osint tasks.☆53Updated last year
- BlueTeam, RedTeam, Bug bounty, OSINT, Threat Hunting, Network and Web Recon, Discovery, Enumeration, Vulnerability Mapping, Exploitation,…☆47Updated last month
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆15Updated 2 years ago
- Hackfruit is an easy search tool that finds hacking tools, commands and cheat sheets. It helps cybersecurity learing and trainings, CTFs,…☆21Updated 2 years ago
- CloudDefense.ai is an automated web application security testing tool that audits your web applications by checking for vulnerabilities l…☆47Updated 6 months ago
- Ransomware for demonstration☆15Updated last year
- An ongoing collection of awesome ethical hacking tools, software, libraries, learning tutorials, frameworks, academic and practical resou…☆30Updated last year
- Curated list of ransomware-related resources; awesome style.☆15Updated last week
- Simple script to bulk check if IPs match networks☆11Updated 3 years ago
- An OSINT tool to search for accounts by username in social networks.☆16Updated 2 years ago
- Script to create Onion Mirror for Clearnet site based on Enterprise Onion Toolkit☆14Updated 3 years ago
- Brahmastra empowers security teams to fortify their defenses and identify potential vulnerabilities in their systems. This comprehensive …☆13Updated last year
- Open Source Intelligence (OSINT)☆12Updated 3 weeks ago
- Source of swisskyrepo.github.io - Public☆14Updated 2 months ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago