Here are some of the most important cyber security tools.
β45May 6, 2023Updated 3 years ago
Alternatives and similar repositories for Cyber-Security-Important-Tools
Users that are interested in Cyber-Security-Important-Tools are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- make virus without codingβ12Apr 7, 2020Updated 6 years ago
- Powerfull Windows Viruses by VBScript! In this file, There are many powerful viruses π that can damage your PC in a matter of seconds.β22Feb 3, 2021Updated 5 years ago
- FOR BTCβ12Mar 28, 2022Updated 4 years ago
- This repository has workflows created for https://github.com/RikunjSindhwad/Task-Ninjaβ24Aug 14, 2025Updated 8 months ago
- ServiceNow CI/CD Jenkins Plugin. This plugin provides build steps with easy parameter setup to help users get started faster with settingβ¦β10Aug 8, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer β’ AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Javascript Botnetβ26Aug 14, 2018Updated 7 years ago
- This is Web Application Penetration Testing Report made for everybody who wanted a glance of how to make a professional report for pentetβ¦β18Sep 3, 2021Updated 4 years ago
- Crack encrypted master Key and ckey of a bitcoin wallet(POC)β17Sep 1, 2022Updated 3 years ago
- This is an osint tool which gathers useful and yet credible valid information about a phone number, user's email address and ip address aβ¦β32Mar 11, 2023Updated 3 years ago
- ButKoin is an experimental decentralized secure cryptocurrency that is easy to mine devoid from 51% attack and it provide easy means of tβ¦β20Jan 22, 2023Updated 3 years ago
- This repository contains tools made by completing exercises from various books on blackhat programming. The intent is to learn writing soβ¦β13May 2, 2026Updated last week
- API Security University & PortSwigger Academy Study Notesβ24Nov 13, 2025Updated 5 months ago
- Tools for Cellular Exploitation on a Global Scale - Blackhat USA 2014β24Feb 12, 2018Updated 8 years ago
- Cobalt Strike/C2 Serversβ13Apr 22, 2021Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer β’ AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Brute Force Checkpoint Instagram [CrackerTOOL] v1.0β20Jul 23, 2017Updated 8 years ago
- π§π»βπ» Android 11 Jetpack Masterclass Udemy Course by Denis Panjutaβ13Aug 27, 2021Updated 4 years ago
- This file implements a library and tool to make malicious PDF files.β14Jan 10, 2023Updated 3 years ago
- Bitcoin miner runs at the possible highest speed your pc can handleβ12Nov 1, 2022Updated 3 years ago
- This repository is the final location for tools I built from the book Black Hat Pythonβ12Aug 1, 2018Updated 7 years ago
- Various shell scripts for CLN (Core Lightning / c-lightning).β13Feb 20, 2025Updated last year
- AI chat with context retrieval using Convex and LangChainβ22Feb 5, 2026Updated 3 months ago
- γπγBug Bounty Tricksβ39Oct 4, 2023Updated 2 years ago
- Blockchain Attack Vectors & Vulnerabilities to Smart Contractsβ35Dec 27, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer β’ AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A collection of prompts for people that want to learn more about cybersecurity topics.β16Mar 31, 2023Updated 3 years ago
- Official Athena OS docker base images.β13Dec 20, 2025Updated 4 months ago
- β14Jun 4, 2023Updated 2 years ago
- An USDT token example for rgb20β14Dec 6, 2023Updated 2 years ago
- Slient-Doc-Pdf-Exploit-Builder-Fud-Malware-Cveβ15Jul 16, 2022Updated 3 years ago
- Provide a GUI desktop experience for Athena OS in Windows Subsystem for Linux (WSL 2).β14Feb 6, 2025Updated last year
- A tool for listing/reversing XPC services inside container sandbox. Reference: https://www.blackhat.com/docs/us-15/materials/us-15-Wang-Rβ¦β22Sep 6, 2018Updated 7 years ago
- multiduplicut : optimize wordlists-based password cracking methods chainingβ16Feb 25, 2022Updated 4 years ago
- parse ffuf & map endpoints to wordlistsβ21Feb 25, 2021Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI β’ AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Python language from the beginning.β11Dec 19, 2021Updated 4 years ago
- All in one hacking scriptβ56Apr 4, 2022Updated 4 years ago
- β10Aug 4, 2020Updated 5 years ago
- Recon for Pentesting and BugBounty π΅οΈβ15Apr 19, 2026Updated 2 weeks ago
- Generate users with "random-ish" realistic passwords or password hashesβ18Jun 24, 2016Updated 9 years ago
- Another Remote Access Control software, written in Golang. It heavily relies on cryptography to avoid threat of botnet use/abuse by otherβ¦β11Jan 12, 2017Updated 9 years ago
- Official Black Hat Arsenal Security Tools Repositoryβ19Jan 1, 2018Updated 8 years ago