All of the Best Links and Resources on Cyber Security
☆75Jan 19, 2026Updated last month
Alternatives and similar repositories for Security-Reference-Guide
Users that are interested in Security-Reference-Guide are comparing it to the libraries listed below
Sorting:
- Hand list of Powershell commands frequently used during penetration tests☆15Oct 14, 2018Updated 7 years ago
- ☆44Oct 11, 2025Updated 4 months ago
- OSINT page for Blogs and Video resources. You will find useful blogs and video resources to help with your OSINT journey.☆21Mar 9, 2025Updated 11 months ago
- ☆26Mar 3, 2022Updated 3 years ago
- Active Directory Pentesting Full Course - Red Team Hacking☆29Dec 13, 2021Updated 4 years ago
- ☆54Feb 23, 2026Updated last week
- ☆13May 24, 2025Updated 9 months ago
- In this repo, I have included the tools that i used for my everyday penetration tests, if you have just installed kali and lost your tool…☆30Oct 16, 2024Updated last year
- ☆37Aug 18, 2019Updated 6 years ago
- Web for Pentester I☆11Sep 21, 2018Updated 7 years ago
- INE Training Notes☆57Apr 7, 2025Updated 10 months ago
- ☆107Feb 12, 2025Updated last year
- Last download from git://git.carnivore.it/honeytrap.git of Honytrap by Tillmann Werner☆44Oct 11, 2021Updated 4 years ago
- A collection of practical implementation of security recommendations☆13Sep 24, 2024Updated last year
- Ask ChatGPT directly from the Chrome address bar (omnibox)☆10Mar 23, 2023Updated 2 years ago
- A semi print-in-place hand for human-like manipulation, designed to be built by anyone.☆17Jan 5, 2026Updated last month
- Simple OBS whiteboard/telestrator plugin☆14Aug 1, 2025Updated 7 months ago
- ☆11May 30, 2021Updated 4 years ago
- Some Powershell scripts developed during my security consulting work. Hopefully they are useful to you too!☆13Apr 19, 2020Updated 5 years ago
- Exploit codes for rconfig <= 3.9.4☆11Mar 17, 2020Updated 5 years ago
- A renderer for sheet diagrams in bimonoidal categories☆13Aug 28, 2021Updated 4 years ago
- ☆13Sep 14, 2023Updated 2 years ago
- ☆10Jan 31, 2022Updated 4 years ago
- ☆23Jan 1, 2026Updated 2 months ago
- Common code, such as validators and mixins, that are shared between ActiveModels in metasploit-framework and ActiveRecords in metasploit_…☆14May 2, 2025Updated 9 months ago
- Ransomware dataset, containing dynamic behaviour of more than 60 distinct ransomware families.☆10Aug 29, 2022Updated 3 years ago
- hacking tools awesome lists☆16Jul 26, 2017Updated 8 years ago
- Siemens Simatic S7 Metasploit Modules☆40Jul 14, 2012Updated 13 years ago
- RSMP Signal Exchange List (SXL) for Traffic Controllers☆12Dec 19, 2025Updated 2 months ago
- Tool for advanced mining for content on Github☆28Nov 11, 2025Updated 3 months ago
- ☆12Sep 25, 2020Updated 5 years ago
- Example of an over all attack using DLL_Wrapper.☆11Aug 22, 2017Updated 8 years ago
- is a tiny FEM framework for C++.☆11Jan 20, 2021Updated 5 years ago
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆16Jan 13, 2022Updated 4 years ago
- Stuff i found out abt Tweaking Windows. May include fixes for ur problems☆13Jun 3, 2022Updated 3 years ago
- This config file will automatically convert a temporary Windows Sandbox environment into a Flare VM for malware analysis.☆11Jan 3, 2025Updated last year
- provides pidfd support on linux 5.6+☆16Apr 2, 2021Updated 4 years ago
- This Repo is under constant update. We will update all the notes while preparing for OSCP. If anyone want to contribute you are most welc…☆11Aug 29, 2019Updated 6 years ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Jul 15, 2022Updated 3 years ago