skilincer / CyberSourceLinks
☆13Updated 6 years ago
Alternatives and similar repositories for CyberSource
Users that are interested in CyberSource are comparing it to the libraries listed below
Sorting:
- AWS Penetration Testing, published by Packt☆32Updated 2 years ago
- ☆32Updated 4 years ago
- Useful commands for pentesting Linux and Windows systems☆14Updated 5 years ago
- Python for Offensive PenTest, published by Packt☆146Updated 2 years ago
- Hash Kit is tool Programmed by me . It consist of three sections : Encoding Hash , Decoding Hash , and Identifying Hash Id .☆12Updated 3 years ago
- ☆22Updated 7 years ago
- ☆66Updated 5 years ago
- An optimized Python3 library to fetch the most recent exploit-database, create searchable indexes for CVE->EDBID and EDBID -> CVE, and pr…☆30Updated 11 months ago
- The OWASP Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and…☆77Updated 6 years ago
- Hands-on Security Automation in DevOps, published by Packt☆52Updated 2 years ago
- A repo to support the book☆44Updated 2 years ago
- Notes from OSCP, CTF, security adventures, etc...☆62Updated last year
- Python Penetration Testing for Developers, published by Packt☆40Updated 2 years ago
- Code Repository for CISM Certification Domain 1: Information Security Governance Video Boot Camp 2019, published by Packt☆13Updated 2 years ago
- Various course materials, scripts, and configurations from my Offensive Security Engineering Course on Udemy☆63Updated this week
- An evolving how-to guide for securing a Linux server.☆15Updated 6 years ago
- Deploy multiple instances of Nessus in docker containers easily☆20Updated 4 years ago
- A list of commands, scripts, resources, and more that I have gathered and attempted to consolidate for use as OSCP (and more) study mater…☆26Updated 6 years ago
- ☆31Updated 4 years ago
- Materials and Synopsis of the course Certified Network Security Specialist (CNSS) provided by The International CyberSecurity Institute (…☆29Updated 5 years ago
- Hacking and Securing Java☆76Updated 6 years ago
- This lab is created to demonstrate pass-the-hash, blind sql and SSTI vulnerabilities☆91Updated 2 years ago
- Dockerfile with advanced configurations for Offensive Docker.☆13Updated 5 years ago
- Perform CVE lookup on cvedetails.com☆27Updated last year
- Stay up-to-date with the latest and greatest ethical hacking tools and resources.☆41Updated 3 years ago
- ☆24Updated 4 years ago
- Empower your enumeration during OSCP☆36Updated 6 years ago
- Web application pentesting recon☆23Updated 5 years ago
- ☆19Updated 4 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆50Updated 5 years ago