A collection of attacks metadata that were used in my previous pen-test tools
☆17Dec 23, 2022Updated 3 years ago
Alternatives and similar repositories for cyber-attacks
Users that are interested in cyber-attacks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆14Dec 28, 2020Updated 5 years ago
- Collection of exploits that were verified by an automated system☆13Jun 17, 2021Updated 4 years ago
- 🧬 Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)☆105Apr 26, 2022Updated 3 years ago
- Some extracted Features\IoCs\Artifacts\Patterns from APT Malware☆14Mar 4, 2020Updated 6 years ago
- Pure Honeypots with an automated bash script☆21Sep 9, 2021Updated 4 years ago
- Agile Sandbox for analyzing Windows, Linux and macOS malware and execution behaviors☆74Nov 12, 2023Updated 2 years ago
- Analyze, extract and visualize features, artifacts and IoCs of files and memory dumps (Windows, Linux, Android, iPhone, Blackberry, macOS…☆312Apr 15, 2024Updated last year
- Scalable URL Sandbox for analyzing URLs and Domains from phishing attacks☆196Oct 30, 2022Updated 3 years ago
- Kali and Parrot OS docker images accessible via VNC, RDP and Web☆129Nov 22, 2021Updated 4 years ago
- Threat intelligence or Cyber Threat Intelligence is the process of identifying and analyzing gathered information about past, current, an…☆13Feb 18, 2024Updated 2 years ago
- An interactive world-map that has been used in live Cyber Threat interfaces☆13Jul 31, 2021Updated 4 years ago
- Cyber Kill Chain is a model that Lockheed Martin created for understanding (Describe the sequence of events) and stopping cyberattacks☆11Jan 29, 2024Updated 2 years ago
- Advanced Cyber Threat Map (Simplified, customizable, responsive and optimized)☆226Aug 8, 2023Updated 2 years ago
- 19 Customizable honeypots for monitoring network traffic, bots activities and username\password credentials (DNS, HTTP Proxy, HTTP, HTTPS…☆828Aug 8, 2023Updated 2 years ago
- How to Convert Bitcoin-PUBKEY HEX Public Keys to Base58 Bitcoin Address and Check Balance for BTC Coins☆11Aug 26, 2022Updated 3 years ago
- Elliptic curve tools, ECDSA, and ECDSA attacks.☆10Oct 29, 2019Updated 6 years ago
- An inventory of tools and resources about CyberSecurity that aims to help people to find everything related to CyberSecurity.☆13Jan 5, 2021Updated 5 years ago
- Anontwi is a tool for OAuth2 applications (such as: GNUSocial, Twitter) that provides different layers of encryption, privacy methods and…☆32Sep 1, 2015Updated 10 years ago
- Adding support s5l89xx support to QEMU☆14Aug 30, 2012Updated 13 years ago
- Electra iOS 11.0 - 11.1.2 jailbreak toolkit based on async_awake, with a force installation of cydia on every run☆10Mar 3, 2018Updated 8 years ago
- A Nmap script optimized for Hack the Box and CTFs☆14Feb 22, 2021Updated 5 years ago
- Interface for Image-Related Deep Learning Models (E.g. NSFW, MAYBE and SFW)☆34Apr 15, 2022Updated 3 years ago
- The best iPhone unlocker.☆17Dec 11, 2023Updated 2 years ago
- GHunt Research & Development Toolkit☆17Dec 3, 2022Updated 3 years ago
- Bypass iOS PIN Passcode☆10May 16, 2014Updated 11 years ago
- An iPod Classic built with React, Redux, & Styled Components☆11Aug 24, 2019Updated 6 years ago
- iCloud Apple iD BruteForcer☆12Jan 2, 2015Updated 11 years ago
- «MrRobotQR» is an open source script that automates the process from entering a search keyword to deriving the private key of a Bitcoin …☆14Dec 7, 2022Updated 3 years ago
- 30 different honeypots in one package! (dhcp, dns, elastic, ftp, http proxy, https proxy, http, https, imap, ipp, irc, ldap, memcache, ms…☆957Dec 3, 2025Updated 3 months ago
- Use your iPhone as a mouse. Rotate it, move it to move the mouse☆14Nov 4, 2021Updated 4 years ago
- ☆11Dec 13, 2021Updated 4 years ago
- suricata rules to pcap☆10Mar 25, 2021Updated 4 years ago
- A little experiment to recreate the Apple TV 1st Gen home-screen in SwiftUI.☆14Jun 28, 2021Updated 4 years ago
- Rust library for encoding/decoding Windows cabinet (.cab) files☆21Jul 16, 2025Updated 8 months ago
- Maltego integration of https://abusix.com☆16Sep 2, 2018Updated 7 years ago
- How to bypass your Bell Aliant provided modems.☆13Feb 2, 2026Updated last month
- A cli tool to save SHSH blobs on iOS using the TSSSaver API☆12Jul 28, 2022Updated 3 years ago
- Cross Site Scripting ( XSS ) Vulnerability Payload List☆23Feb 23, 2021Updated 5 years ago
- Data and scripts for examining the Department of Defense's 1033 excess equipment program☆17Jun 21, 2022Updated 3 years ago