strongX509 / cyber
A collection of cyber tutorials including Python examples
☆15Updated 2 years ago
Alternatives and similar repositories for cyber:
Users that are interested in cyber are comparing it to the libraries listed below
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 2 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Updated 2 years ago
- Script for importing Nmap results into a Neo4j Graph Database☆20Updated 3 years ago
- Simple Phishing Toolkit is a super easy to install and use phishing framework built to help Information Security professionals find human…☆25Updated 6 years ago
- Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection☆27Updated 10 months ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆73Updated 4 months ago
- Curated list of awesome, open source data exfiltration tools☆56Updated 3 years ago
- Central IoC scanner based on Loki☆20Updated 3 years ago
- A cheat sheet that contains the most OpenSSL commands used by Dev, SysAdmin in real life.☆60Updated 4 years ago
- NSE script which leverages the Censys Search API for passive data collection☆58Updated 3 years ago
- Hashes of infamous malware☆26Updated last year
- A web front-end for password cracking and analytics☆16Updated 6 years ago
- Virtual machines that are set up with a variety of known vulnerabilities.☆14Updated 3 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 8 months ago
- A learning and testing environment for web application hacking and pentesting.☆26Updated 4 years ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆94Updated 3 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 5 months ago
- ☆42Updated 2 years ago
- Censys Maltego transforms! Take advantage of Censys transforms for Maltego to back your investigations with the most trusted Internet dat…☆37Updated last year
- List of sources for cybersecurity news☆36Updated 2 years ago
- random scripts and utilities used for pentesting or R&D purposes☆9Updated last year
- Deploy multiple instances of Nessus in docker containers easily☆20Updated 4 years ago
- ☆28Updated last week
- Collaborative pentest tool with highly customizable tools☆72Updated 3 years ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆70Updated last year
- Zeek Profinet I/O Context Manager Parser - CISA ICSNPP☆10Updated 5 months ago
- Pure Honeypots with an automated bash script☆20Updated 3 years ago
- Selenium based web scraper to generate passwords list☆51Updated 4 years ago
- Script to test NetSec capabilities.☆21Updated last year
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆18Updated last year