All of the Best Links and Resources on Cyber Security
☆75Jan 19, 2026Updated 2 months ago
Alternatives and similar repositories for Security-Reference-Guide
Users that are interested in Security-Reference-Guide are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Benchmark for memory store throughput☆23Jun 22, 2021Updated 4 years ago
- A collaboration effort by the DFIR community to provide definitions (sometimes multiple) for common forensic terms!☆26Dec 1, 2022Updated 3 years ago
- ☆11Dec 17, 2023Updated 2 years ago
- OSINT page for Blogs and Video resources. You will find useful blogs and video resources to help with your OSINT journey.☆21Mar 9, 2025Updated last year
- ☆38Aug 8, 2021Updated 4 years ago
- Hand list of Powershell commands frequently used during penetration tests☆15Oct 14, 2018Updated 7 years ago
- ☆26Mar 3, 2022Updated 4 years ago
- random scripts for random things☆13Mar 3, 2026Updated 2 weeks ago
- Retrieve all mails of users related to a git repository, a git user or a git organization☆57May 1, 2024Updated last year
- ☆12Sep 13, 2023Updated 2 years ago
- https://bc-security.gitbook.io/empire-wiki/☆13Aug 2, 2023Updated 2 years ago
- Automated Persistence and Lateral Movement using GCP Patch Management☆16Aug 11, 2022Updated 3 years ago
- Active Directory Pentesting Full Course - Red Team Hacking☆29Dec 13, 2021Updated 4 years ago
- Library for shellcode injection☆16Mar 21, 2025Updated last year
- ☆58Updated this week
- Awesome hacking is an awesome collection of hacking tools.☆14Apr 24, 2019Updated 6 years ago
- Wireshark Lua Dissector for inspecting the Crimson v3 protocol☆16Sep 3, 2014Updated 11 years ago
- Example of an over all attack using DLL_Wrapper.☆11Aug 22, 2017Updated 8 years ago
- ☆17Mar 7, 2019Updated 7 years ago
- Exploit codes for rconfig <= 3.9.4☆11Mar 17, 2020Updated 6 years ago
- ☆13Oct 16, 2025Updated 5 months ago
- ☆15Oct 3, 2024Updated last year
- Resources for SANS CTI Summit 2020 presentation☆20Dec 24, 2019Updated 6 years ago
- ☆20Nov 22, 2016Updated 9 years ago
- A simple webapp to visualise TOML☆10Nov 29, 2023Updated 2 years ago
- This repository contains a mindmap for different techniques for using Censys Search☆15Sep 17, 2025Updated 6 months ago
- 存储iot设备分析工具和分析文件☆14May 28, 2021Updated 4 years ago
- Easy way to automate the complex task☆15Jul 15, 2022Updated 3 years ago
- The Complete Docker Swarm Production Guide for 2026 - Battle-tested configurations, VPS planning, monitoring, and deployment workflows☆48Jan 16, 2026Updated 2 months ago
- A simple web application vulnerability lab made for the HackerOne Veterans day event☆18Mar 10, 2021Updated 5 years ago
- Living off the False Positive!☆42Jan 31, 2025Updated last year
- ☆15Dec 10, 2022Updated 3 years ago
- An OSINT focused tool made with Nodejs!☆11Oct 4, 2022Updated 3 years ago
- My talks...☆25Feb 27, 2025Updated last year
- CipherRun is an ethical hacking tool used to execute shellcode easily while bypassing antivirus solutions.☆11Jan 30, 2024Updated 2 years ago
- Here you find the complete list of enrichments and extractionsfor Ubikron.☆34Mar 6, 2026Updated 2 weeks ago
- ☆12Jan 20, 2025Updated last year
- A companion list of tools for my commonplacing☆19Updated this week
- A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.☆13Apr 1, 2019Updated 6 years ago