r0r0x-xx / AeroSpace-CybersecurityLinks
☆185Updated 7 months ago
Alternatives and similar repositories for AeroSpace-Cybersecurity
Users that are interested in AeroSpace-Cybersecurity are comparing it to the libraries listed below
Sorting:
- This repo contains my pentesting template that I have used in PWK and for current assessments. The template has been formatted to be used…☆225Updated 8 months ago
- ICSGoat: A Damn Vulnerable ICS Infrastructure☆25Updated last year
- ☆241Updated 7 months ago
- Find CVEs associated to Linux and public exploits on github☆119Updated 4 months ago
- This Repo serves as a collection of shared security and penetration testing resources for the cloud.☆276Updated last year
- My personal OT resource list, gather throughout research and internet adventure.☆96Updated 3 months ago
- A collection of Active Directory, phishing, mobile technology, system, service, web application, and wireless technology weaknesses that …☆251Updated 2 years ago
- List of tools and resources for pentesting Microsoft Active Directory☆85Updated last month
- Quick scripts I developed to streamline OSCP tasks☆165Updated 2 months ago
- Knowledge Management for Offensive Security Professionals Official Repository☆148Updated 6 months ago
- Comprehensive notes, cheatsheets, and practical techniques for penetration testing and red teaming.☆86Updated last month
- TCM PEH Course AD Lab Build Script (Hydra-DC, Punisher-Workstation, Spiderman-Workstation)☆145Updated last year
- A command-line tool to query the DeHashed API. Easily search for various parameters like usernames, emails, hashed passwords, IP addresse…☆243Updated last month
- Collection of Notes and CheatSheets used for Red teaming Certs☆459Updated 2 years ago
- A PlayBook for OSWP & Wireless Pentest☆37Updated last year
- Dredging up secrets from the depths of the file system☆131Updated 9 months ago
- DECeption with Evaluative Integrated Validation Engine (DECEIVE): Let an LLM do all the hard honeypot work!☆258Updated 2 months ago
- This class is a broad overview and dive into Exploiting AI and the different attacks that exist, and best practice strategies.☆60Updated this week
- A visual reference of 118 essential red team tools, frameworks & standards, organized like a periodic table. Includes a printable PDF ver…☆108Updated 2 months ago
- AI for Ethical Hacking - Workshop☆168Updated last week
- A list of the best cybersecurity research related blogs.☆29Updated 3 months ago
- Describing and documenting the process of deploying a HomeLab for security research and training☆40Updated 3 months ago
- Overflowme is a walkthrough to learn the basics of binary exploitation. Detailed instructions, stack diagrams and fully commented assembl…☆55Updated 3 months ago
- Everything from my OSEP study.☆172Updated 7 months ago
- Pentest Report Generator☆425Updated last week
- A repository of advice and guides to share with friends and family who are concerned about their safety during online activities and the …☆133Updated last year
- Hack The Box CPTS, CBBH, CDSA, CWEE, CAPE, CJCA Exam and Lab Reporting / Note-Taking Tool☆254Updated last month
- This OSINT Notebook provides an overview of the tools, techniques, and resources that I use for a variety of situations when it comes to …☆354Updated last year
- DFIR LABS - A compilation of challenges that aims to provide practice in simple to advanced concepts in the following topics: Digital For…☆334Updated 2 weeks ago
- Resources for Students in the Practical Webapp Security and Testing course☆170Updated 2 years ago