All of the Best Links and Resources on Cyber Security
☆77Jan 19, 2026Updated 3 months ago
Alternatives and similar repositories for Security-Reference-Guide
Users that are interested in Security-Reference-Guide are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆46Mar 31, 2026Updated last month
- A collaboration effort by the DFIR community to provide definitions (sometimes multiple) for common forensic terms!☆26Dec 1, 2022Updated 3 years ago
- ☆39Aug 8, 2021Updated 4 years ago
- Hand list of Powershell commands frequently used during penetration tests☆15Oct 14, 2018Updated 7 years ago
- Random Tips and Writeups.☆15Feb 21, 2019Updated 7 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆26Mar 3, 2022Updated 4 years ago
- Creating a virtual machine template under Ubuntu Server 24.04 LTS from ISO file with Packer using VMware Workstation☆10Updated this week
- ☆11Oct 25, 2021Updated 4 years ago
- CrushFTP <= 10.5.1 Remote Code Execution. Researchers: Ryan Emmons, Evan Malamis☆17Jun 14, 2024Updated last year
- https://bc-security.gitbook.io/empire-wiki/☆13Aug 2, 2023Updated 2 years ago
- Active Directory Pentesting Full Course - Red Team Hacking☆31Dec 13, 2021Updated 4 years ago
- Speak to your shell using various metaphors sourced from differing cultural dialects.☆14Jan 14, 2021Updated 5 years ago
- Awesome hacking is an awesome collection of hacking tools.☆14Apr 24, 2019Updated 7 years ago
- ☆68Apr 22, 2026Updated last week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Wireshark Lua Dissector for inspecting the Crimson v3 protocol☆16Sep 3, 2014Updated 11 years ago
- Example of an over all attack using DLL_Wrapper.☆11Aug 22, 2017Updated 8 years ago
- Exploit codes for rconfig <= 3.9.4☆11Mar 17, 2020Updated 6 years ago
- ☆13Oct 16, 2025Updated 6 months ago
- Windows kernel☆12Oct 15, 2020Updated 5 years ago
- ☆23Aug 30, 2024Updated last year
- Resources for SANS CTI Summit 2020 presentation☆20Dec 24, 2019Updated 6 years ago
- My OSCP and eCPPTv3 Exam Notes☆39Aug 20, 2025Updated 8 months ago
- A cheatsheet I made while taking OSCP+/PEN-200 in 2024-2025☆45Apr 1, 2025Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆20Nov 22, 2016Updated 9 years ago
- A simple webapp to visualise TOML☆11Nov 29, 2023Updated 2 years ago
- Siemens Simatic S7 Metasploit Modules☆41Jul 14, 2012Updated 13 years ago
- This repository contains a mindmap for different techniques for using Censys Search☆15Sep 17, 2025Updated 7 months ago
- ☆37Aug 18, 2019Updated 6 years ago
- ☆11Jul 31, 2024Updated last year
- curated list of open-source anti-censorship tools☆20Mar 31, 2022Updated 4 years ago
- Easy way to automate the complex task☆15Jul 15, 2022Updated 3 years ago
- PowerShell cmdlets you may find useful☆14Jan 8, 2025Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A simple web application vulnerability lab made for the HackerOne Veterans day event☆17Mar 10, 2021Updated 5 years ago
- My handbook for Windows Privilege Escalation concepts. Do Check out my Playlist, link: https://www.youtube.com/playlist?list=PLlrnAg4kKF3…☆57Jul 12, 2022Updated 3 years ago
- CipherRun is an ethical hacking tool used to execute shellcode easily while bypassing antivirus solutions.☆11Jan 30, 2024Updated 2 years ago
- My talks...☆25Feb 27, 2025Updated last year
- ☆12Jan 20, 2025Updated last year
- Intelligence Architecture Mind Map☆146Mar 15, 2024Updated 2 years ago
- A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.☆13Apr 1, 2019Updated 7 years ago