An ongoing list of virtual cybersecurity conferences.
☆122Mar 1, 2021Updated 5 years ago
Alternatives and similar repositories for virtualseccons
Users that are interested in virtualseccons are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Who and what to follow in the world of cyber security☆152Sep 23, 2020Updated 5 years ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆24Jun 13, 2023Updated 2 years ago
- A Simple Log4j Indicator of Compromise Linux Detector☆17Dec 15, 2021Updated 4 years ago
- A PoC that uses the DirSync protocol to poll Active Directory for changes☆13Aug 16, 2020Updated 5 years ago
- UglyEXe - bypass some AVs☆17Feb 28, 2020Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Kali Linux Cheat Sheet for Penetration Testers☆14Jun 19, 2017Updated 8 years ago
- Python tool to find vulnerable AD object and generating csv report☆14Jul 4, 2022Updated 3 years ago
- SACTI - Securely aggregate CTI sightings and report them on MISP☆14Oct 24, 2022Updated 3 years ago
- CITL's static analysis engine for native code artifacts☆20Apr 29, 2021Updated 4 years ago
- Automated System Hardening (ash-windows) is a Salt formula to apply SCAP benchmarks to Windows systems☆20Apr 6, 2026Updated last week
- This Repo contains wordlist for subdomain enumeration , php file path, html file path, and js file path☆107Aug 4, 2020Updated 5 years ago
- Security checks for your researches☆34Nov 22, 2020Updated 5 years ago
- Black Friday deals (Cyber/OSINT/Infosec)☆29Dec 6, 2020Updated 5 years ago
- This repository is for the vagrant instances of VulnHub machines☆46Sep 12, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Exactly what it sounds like, which is something rad☆22Oct 12, 2022Updated 3 years ago
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Jun 1, 2021Updated 4 years ago
- A quick reference script that can easily display reverse shells for different languages.☆20May 28, 2020Updated 5 years ago
- Service-Now Article Bruteforcer☆16Jun 5, 2020Updated 5 years ago
- [WIP] Simple mobile applications sandbox file browser tool. Powered with [frida.re](https://www.frida.re).☆124Nov 27, 2020Updated 5 years ago
- DC540 hacking challenge 0x00005b.☆16Nov 26, 2025Updated 4 months ago
- Automate the regular transfer of AIS data into a MISP Server☆10Jun 5, 2024Updated last year
- An automation framework for CyberSecurity Tools☆12Dec 6, 2025Updated 4 months ago
- TA505+ Adversary Simulation☆64Nov 30, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- This program will connect to Google's API using an access token and inject a calendar event into a target's calendar.☆18Oct 9, 2019Updated 6 years ago
- Threat Hunting tool about Sysmon and graphs☆339May 28, 2023Updated 2 years ago
- Haschcat Rules processor☆14Mar 22, 2023Updated 3 years ago
- Cheatsheet collection of Infosec tools☆15May 18, 2019Updated 6 years ago
- A curated list of Awesome Threat Intelligence resources☆34Jan 12, 2018Updated 8 years ago
- This repository contains a list of tools that may be useful for consultants performing penetration testing engagements.☆18Oct 11, 2019Updated 6 years ago
- Monitors the network for new connected MAC addresses☆17Dec 10, 2022Updated 3 years ago
- urlscan.io API wrapper for Ruby☆13Oct 16, 2023Updated 2 years ago
- RuraSort - A utility to sort and streamline wordlists.☆27Dec 22, 2019Updated 6 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆14Mar 10, 2026Updated last month
- Notebooks created to attack and secure Active Directory environments☆27Nov 18, 2019Updated 6 years ago
- Exploiting misconfigured firebase databases☆123Jun 5, 2019Updated 6 years ago
- Some of my presentations and published articles in different conferences☆18Sep 27, 2021Updated 4 years ago
- Threat Intel and Incident Reponse☆10Aug 29, 2018Updated 7 years ago
- Overview about existing tools that can be useful for AWS auditing purposes.☆15Sep 25, 2017Updated 8 years ago
- A Python-based client for the Cisco openVuln API☆38Nov 9, 2025Updated 5 months ago