☆18Dec 23, 2024Updated last year
Alternatives and similar repositories for awsome-security-mindmaps
Users that are interested in awsome-security-mindmaps are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- SharpShareFinder is a minimalistic network share discovery POC designed to enumerate shares in Windows Active Directory networks leveragi…☆36Jul 10, 2024Updated last year
- Automated Cloud Misconfiguration Testing☆25Jun 20, 2025Updated 9 months ago
- A tool to check microsofts user real endpoint to get data about a tenant.☆16Feb 6, 2025Updated last year
- Bat Script to collect system and network information from Windows machines without external agents. Ideal for vulnerability assessment an…☆11Jan 27, 2025Updated last year
- A keylogger, sometimes called a keystroke logger or keyboard capture, is a type of surveillance technology used to monitor and record eac…☆18Jul 29, 2024Updated last year
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆16Jan 21, 2025Updated last year
- Explore and filter your GitHub starred repositories☆25Dec 5, 2023Updated 2 years ago
- # Instagram-Login-Page-Clone☆11Jun 9, 2024Updated last year
- Basic tool for Information Gathering 🚀☆24Mar 26, 2024Updated 2 years ago
- A simple python based Key-Logger project in Cyber Security☆46Jan 30, 2025Updated last year
- a simple keylogger in python that sends the keystrokes to the server (Telegram)☆23Aug 18, 2025Updated 7 months ago
- Mishky's AD Range & The Escalation Path from Hell, Version 1.1☆12May 7, 2025Updated 11 months ago
- Documentation and tools to curate Sigma rules for Windows event logs into easier to parse rules.☆15Oct 22, 2025Updated 5 months ago
- TLS fingerprint emulation upstream proxy replay any ClientHello☆37Updated this week
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A repository dedicated to tracking ransomware families based on leaked builders.☆22Apr 17, 2024Updated last year
- A Bash script for universal OS detection☆16Sep 24, 2024Updated last year
- Advanced Telegram x Discord C2, great for data Exfitration and Network evasion 🔷☆88Feb 22, 2025Updated last year
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Aug 16, 2022Updated 3 years ago
- ☆11May 30, 2021Updated 4 years ago
- Unauthorized Docker Exploitation Tool☆37Dec 24, 2023Updated 2 years ago
- This is a project to perform a BRUTE FORCE attack on a self hosted website to better the understanding of the importance of cybersecurity…☆32Jul 6, 2024Updated last year
- Example of a serverless web reconaissance workflow's AWS architecture.☆11Feb 25, 2023Updated 3 years ago
- tsellm: LLMs in SQLite and DuckDB☆24Apr 21, 2025Updated 11 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- An advanced scanner for exposed secrets in web pages, APIs, and source code.☆13Apr 22, 2025Updated 11 months ago
- ☆13Jan 11, 2025Updated last year
- 0xCipherLink ensures safe and encrypted file sharing using AES-256 encryption and PBKDF2 key derivation. With a user-friendly Tkinter int…☆54Jul 1, 2024Updated last year
- ☆12Jul 17, 2024Updated last year
- NeoLED - ESP32 Component for WS2812 LEDs Using I2S☆16Jan 22, 2026Updated 2 months ago
- This repository contains Bug Bounty writeups☆75Updated this week
- Hijack a slack bot to phish your way in☆57Jul 17, 2025Updated 8 months ago
- My shellcodes (or shellcodish-things) written for educational purpose in NASM assembly.☆46Jul 23, 2024Updated last year
- CIS & Azure Security Center Hardening recommendations implemented in PowerShell DSC from Azure Automation☆34Jun 10, 2021Updated 4 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Password Manager is a simple and secure application designed to store and manage your passwords. Developed using Java, it employs AES enc…☆55Sep 10, 2024Updated last year
- A python based utility to download animes for offline viewing ¯\(ツ)/¯☆13Mar 22, 2021Updated 5 years ago
- nodecraw allows you to perform web crawling on specified URLs. It utilizes various modules and libraries to crawl web pages, extract info…☆13Aug 25, 2024Updated last year
- A collection of config files for linux focusing on hackthebox theme☆53Updated this week
- Dive into a handpicked selection of tools, guides, and tips tailored for beginners in Bug Bounty and Penetration Testing. 🐛🛡️☆38Aug 14, 2024Updated last year
- ☆13Jul 8, 2024Updated last year
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago