☆18Dec 23, 2024Updated last year
Alternatives and similar repositories for awsome-security-mindmaps
Users that are interested in awsome-security-mindmaps are comparing it to the libraries listed below
Sorting:
- ☆43Jul 31, 2024Updated last year
- ☆13Sep 28, 2024Updated last year
- A tool to check microsofts user real endpoint to get data about a tenant.☆16Feb 6, 2025Updated last year
- Bat Script to collect system and network information from Windows machines without external agents. Ideal for vulnerability assessment an…☆11Jan 27, 2025Updated last year
- The Vulnerability Assessment project aims to identify and address security vulnerabilities in a Windows 10 virtual machine (VM). Using N…☆18Mar 4, 2024Updated 2 years ago
- A keylogger, sometimes called a keystroke logger or keyboard capture, is a type of surveillance technology used to monitor and record eac…☆18Jul 29, 2024Updated last year
- ☆16Jan 21, 2025Updated last year
- Sample Vulnerable and Secure Code Snippets for Various Vulnerabilities☆23Jun 18, 2024Updated last year
- Explore and filter your GitHub starred repositories☆25Dec 5, 2023Updated 2 years ago
- An Advanced Web Application Firewall that protects against threats like SQL injection and XSS by filtering HTTP traffic. It combines sign…☆51May 2, 2025Updated 10 months ago
- A simple python based Key-Logger project in Cyber Security☆45Jan 30, 2025Updated last year
- This repository holds some very beginner projects that I worked on related to cybersecurity.☆23Sep 23, 2024Updated last year
- Github Search is a quite powerful and useful feature that can be used to search for sensitive data on repositories. Collection of Github …☆21Aug 11, 2024Updated last year
- A software tool kit to help identify quickly what's inside your binary files.☆14Dec 9, 2024Updated last year
- Mishky's AD Range & The Escalation Path from Hell, Version 1.1☆11May 7, 2025Updated 10 months ago
- Pyload RCE with js2py sandbox escape☆17Oct 26, 2024Updated last year
- ☆12May 5, 2024Updated last year
- ☆24Aug 25, 2024Updated last year
- A Bash script for universal OS detection☆16Sep 24, 2024Updated last year
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Aug 16, 2022Updated 3 years ago
- ☆11May 30, 2021Updated 4 years ago
- Unauthorized Docker Exploitation Tool☆37Dec 24, 2023Updated 2 years ago
- C++知识库、资源收集整理(持续更新)☆15Jul 16, 2018Updated 7 years ago
- ☆13Nov 5, 2024Updated last year
- exfiltration/infiltration toolkit☆23Dec 20, 2023Updated 2 years ago
- tsellm: LLMs in SQLite and DuckDB☆25Apr 21, 2025Updated 11 months ago
- An advanced scanner for exposed secrets in web pages, APIs, and source code.☆13Apr 22, 2025Updated 10 months ago
- ☆13Jan 11, 2025Updated last year
- 0xCipherLink ensures safe and encrypted file sharing using AES-256 encryption and PBKDF2 key derivation. With a user-friendly Tkinter int…☆51Jul 1, 2024Updated last year
- ☆15Jul 2, 2024Updated last year
- This repository contains Bug Bounty writeups☆73Updated this week
- Extract metadata from a video to an sqlite database☆20May 23, 2024Updated last year
- NeoLED - ESP32 Component for WS2812 LEDs Using I2S☆16Jan 22, 2026Updated last month
- 10K+ req/s batch API client for LLM endpoints — Rust, async, load-balanced☆19Feb 21, 2026Updated last month
- A Python CLI application that demonstrates how you can access AWS services, such as Amazon S3 and Amazon Athena, using trusted identity p…☆12Mar 11, 2025Updated last year
- CIS & Azure Security Center Hardening recommendations implemented in PowerShell DSC from Azure Automation☆34Jun 10, 2021Updated 4 years ago
- A python based utility to download animes for offline viewing ¯\(ツ)/¯☆13Mar 22, 2021Updated 4 years ago
- nodecraw allows you to perform web crawling on specified URLs. It utilizes various modules and libraries to crawl web pages, extract info…☆13Aug 25, 2024Updated last year
- A collection of config files for linux focusing on hackthebox theme☆53Oct 10, 2025Updated 5 months ago