A collection of attacks metadata that were used in my previous pen-test tools
☆17Dec 23, 2022Updated 3 years ago
Alternatives and similar repositories for cyber-attacks
Users that are interested in cyber-attacks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆14Dec 28, 2020Updated 5 years ago
- Collection of exploits that were verified by an automated system☆13Jun 17, 2021Updated 4 years ago
- 🧬 Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)☆105Apr 26, 2022Updated 3 years ago
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)☆48Apr 26, 2021Updated 4 years ago
- Custom security distro for remote penetration testing☆56Mar 26, 2021Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Some extracted Features\IoCs\Artifacts\Patterns from APT Malware☆14Mar 4, 2020Updated 6 years ago
- Pure Honeypots with an automated bash script☆21Sep 9, 2021Updated 4 years ago
- Agile Sandbox for analyzing Windows, Linux and macOS malware and execution behaviors☆74Nov 12, 2023Updated 2 years ago
- Analyze, extract and visualize features, artifacts and IoCs of files and memory dumps (Windows, Linux, Android, iPhone, Blackberry, macOS…☆313Apr 15, 2024Updated last year
- Scalable URL Sandbox for analyzing URLs and Domains from phishing attacks☆197Oct 30, 2022Updated 3 years ago
- Kali and Parrot OS docker images accessible via VNC, RDP and Web☆129Nov 22, 2021Updated 4 years ago
- An interactive world-map that has been used in live Cyber Threat interfaces☆13Jul 31, 2021Updated 4 years ago
- Cyber Kill Chain is a model that Lockheed Martin created for understanding (Describe the sequence of events) and stopping cyberattacks☆11Jan 29, 2024Updated 2 years ago
- Advanced Cyber Threat Map (Simplified, customizable, responsive and optimized)☆227Aug 8, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Find all hostnames related to a given domain. Helpful during VA/PT work.☆16May 1, 2022Updated 3 years ago
- An adversary may utilize a sim swapping attack for defeating 2fa authentication☆26Jan 29, 2024Updated 2 years ago
- How to Convert Bitcoin-PUBKEY HEX Public Keys to Base58 Bitcoin Address and Check Balance for BTC Coins☆11Aug 26, 2022Updated 3 years ago
- A meta-scan tool used to kick off a number of command-line security tools during VA/PT work.☆23May 1, 2022Updated 3 years ago
- We have compiled an exhaustive list of cryptocurrency exchange hacks [ 2011 – 2022 ] – you will be amazed at how much has been stolen ove…☆12Dec 7, 2022Updated 3 years ago
- Adding support s5l89xx support to QEMU☆14Aug 30, 2012Updated 13 years ago
- Electra iOS 11.0 - 11.1.2 jailbreak toolkit based on async_awake, with a force installation of cydia on every run☆10Mar 3, 2018Updated 8 years ago
- A Nmap script optimized for Hack the Box and CTFs☆15Feb 22, 2021Updated 5 years ago
- The best iPhone unlocker.☆17Dec 11, 2023Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Does a dictionary lookup on common, valuable hostnames for a given domain.☆26May 1, 2022Updated 3 years ago
- GHunt Research & Development Toolkit☆17Dec 3, 2022Updated 3 years ago
- This is created for updating Various Viruses, malware, and all! Also new kind for vulnerability and attacks!☆13Jun 6, 2021Updated 4 years ago
- An iPod Classic built with React, Redux, & Styled Components☆11Aug 24, 2019Updated 6 years ago
- A swiss army knife for pentesting networks☆24Mar 16, 2023Updated 3 years ago
- Ultimate Internet of Things/Industrial Control Systems reconnaissance tool.☆11Feb 11, 2022Updated 4 years ago
- «MrRobotQR» is an open source script that automates the process from entering a search keyword to deriving the private key of a Bitcoin …☆14Dec 7, 2022Updated 3 years ago
- Use your iPhone as a mouse. Rotate it, move it to move the mouse☆14Nov 4, 2021Updated 4 years ago
- ☆11Dec 13, 2021Updated 4 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- A little experiment to recreate the Apple TV 1st Gen home-screen in SwiftUI.☆14Jun 28, 2021Updated 4 years ago
- Rust library for encoding/decoding Windows cabinet (.cab) files☆21Jul 16, 2025Updated 8 months ago
- Open Source release of the code for the iOS retro 80s platform game Loot Raider☆14Jan 21, 2022Updated 4 years ago
- ☆19Feb 3, 2024Updated 2 years ago
- Maltego integration of https://abusix.com☆16Sep 2, 2018Updated 7 years ago
- Fetch all Honeypot☆12Oct 3, 2018Updated 7 years ago
- Listen to the weather using Sonic Pi and data from Mathematica☆11Dec 6, 2018Updated 7 years ago