r0r0x-xx / AeroSpace-CybersecurityLinks
☆202Updated last year
Alternatives and similar repositories for AeroSpace-Cybersecurity
Users that are interested in AeroSpace-Cybersecurity are comparing it to the libraries listed below
Sorting:
- This repo contains my pentesting template that I have used in PWK and for current assessments. The template has been formatted to be used…☆237Updated last year
- My personal OT resource list, gather throughout research and internet adventure.☆130Updated 2 months ago
- ☆243Updated last year
- Find CVEs associated to Linux and public exploits on github☆119Updated 9 months ago
- ICSGoat: A Damn Vulnerable ICS Infrastructure☆31Updated last year
- PAYGoat is a banking application built for educational purposes, focused on exploring and understanding common business logic flaws in fi…☆183Updated last month
- List of tools and resources for pentesting Microsoft Active Directory☆114Updated 6 months ago
- Comprehensive notes, cheatsheets, and practical techniques for penetration testing and red teaming.☆103Updated 3 weeks ago
- A collection of Active Directory, phishing, mobile technology, system, service, web application, and wireless technology weaknesses that …☆255Updated 3 years ago
- Quick scripts I developed to streamline OSCP tasks☆198Updated 7 months ago
- Knowledge Management for Offensive Security Professionals Official Repository☆152Updated 11 months ago
- PwnPad is an affordable, hands-on hardware hacking platform built for practical learning. It features a range of challenges that walk use…☆129Updated last month
- This Repo serves as a collection of shared security and penetration testing resources for the cloud.☆290Updated last year
- Execute commands across Windows and Linux systems using multiple RCE methods☆62Updated last week
- Collection of Notes and CheatSheets used for Red teaming Certs☆486Updated 2 years ago
- Overflowme is a walkthrough to learn the basics of binary exploitation. Detailed instructions, stack diagrams and fully commented assembl…☆65Updated 9 months ago
- DECeption with Evaluative Integrated Validation Engine (DECEIVE): Let an LLM do all the hard honeypot work!☆274Updated 7 months ago
- A command-line tool to query the DeHashed API. Easily search for various parameters like usernames, emails, hashed passwords, IP addresse…☆258Updated 6 months ago
- All the deals for InfoSec related software/tools this Black Friday☆261Updated 2 months ago
- Everything from my OSEP study.☆184Updated 3 weeks ago
- A visual reference of 118 essential red team tools, frameworks & standards, organized like a periodic table. Includes a printable PDF ver…☆128Updated 2 months ago
- DFIR LABS - A compilation of challenges that aims to provide practice in simple to advanced concepts in the following topics: Digital For…☆411Updated 2 months ago
- Dredging up secrets from the depths of the file system☆131Updated last year
- AI for Ethical Hacking - Workshop☆246Updated 2 months ago
- Very Vulnerable Management API (VVMA) is a deliberately insecure RESTful API built with Node.js for educational and testing purposes. It …☆66Updated 7 months ago
- Describing and documenting the process of deploying a HomeLab for security research and training☆41Updated 8 months ago
- SOAR Automation with Shuffle, Wazuh & TheHive | This project integrates Shuffle SOAR, Wazuh SIEM, and TheHive to automate security incide…☆118Updated 11 months ago
- Certified Red Team Operator☆446Updated 3 years ago
- Certainly is a offensive security toolkit to capture large amounts of traffic in various network protocols in bitflip and typosquat scena…☆223Updated last year
- A PlayBook for OSWP & Wireless Pentest☆46Updated last year