paulveillard / cybersecurity-networking
An ongoing curated collection of awesome software, libraries, frameworks, talks & videos, best practices, learning tutorials and important practical resources about networking in cybersecurity
☆11Updated 2 years ago
Alternatives and similar repositories for cybersecurity-networking:
Users that are interested in cybersecurity-networking are comparing it to the libraries listed below
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆13Updated 11 months ago
- A collection of cybsecurity tools, software, libraries, learning tutorials, frameworks, academic and practical resources in security.☆12Updated 11 months ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆16Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆15Updated 2 years ago
- Kali Linux extra useful packages for CTF and Pentest activities☆10Updated last month
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆20Updated 2 years ago
- An ongoing & curated collection of awesome software practices and remediation, libraries and frameworks,payloads and techniques, best gui…☆34Updated last year
- A collection of awesome framework, libraries, learning tutorials, videos, webcasts, technical resources and cool stuff about Social Engin…☆17Updated 3 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆26Updated last year
- A collection of awesome tools, software, libraries, learning tutorials & videos, frameworks, best practices and technical resources abou…☆49Updated 2 years ago
- A learning and testing environment for web application hacking and pentesting.☆26Updated 4 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 6 months ago
- An experimental Velociraptor implementation using cloud infrastructure☆23Updated this week
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆39Updated 2 years ago
- An ongoing collection of awesome penetration testing (pentest) tools, software, libraries, learning tutorials, frameworks, academic and p…☆16Updated 2 years ago
- Python for Defenders Course Resources☆16Updated 10 months ago
- Cybersecurity Security Operations Center (SOC) Analyst NOW, by EC-Council☆25Updated last year
- ☆17Updated last year
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆15Updated 2 years ago
- A network logging tool that logs per process activities☆32Updated last year
- This repository contains the PowerShell script for adding and removing the Sticky Key backdoor on Windows☆32Updated 4 years ago
- Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152☆18Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, website…☆11Updated 2 years ago
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆19Updated 11 months ago
- This repository contains the files that provide the upload functionality in the IIS Server☆27Updated 3 years ago
- A simple pentest container equipped with common python pentest tools.☆41Updated 2 months ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆37Updated last year
- Internal Network Penetration Test Playbook☆18Updated 3 years ago
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆34Updated 6 months ago
- Top 400 passwords as per HaveIBeenPwned☆21Updated 3 months ago