A collection of cyber tutorials including Python examples
☆17Oct 10, 2022Updated 3 years ago
Alternatives and similar repositories for cyber
Users that are interested in cyber are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- OWASP Foundation Web Respository☆11Jan 14, 2026Updated 3 months ago
- Install Script for CS☆11Aug 26, 2019Updated 6 years ago
- ☆12Oct 10, 2024Updated last year
- Learn about a network from a pcap file or reading from an interface☆29Apr 6, 2024Updated 2 years ago
- ☆15May 17, 2018Updated 7 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- The rev.ng demos☆13Mar 11, 2026Updated last month
- Issues to consider when planning a red team exercise.☆14Aug 23, 2017Updated 8 years ago
- ☆12Aug 8, 2024Updated last year
- ☆12Jan 28, 2023Updated 3 years ago
- ☆10Jan 3, 2023Updated 3 years ago
- ☆11Dec 4, 2024Updated last year
- Publicly-available tools from Rogue Valley Information Security☆14Feb 5, 2025Updated last year
- Priv8 Tools Software Mass Dork Auto Exploit.☆12Feb 1, 2023Updated 3 years ago
- Reproducing feature engineering & oversampling experiments on TPEHG DB and assessing the real impact of over-sampling☆16Jan 19, 2020Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Lists of hacking: Blog, Forums, Telegram channel and all kind of resources in spanish and english.☆15Mar 7, 2021Updated 5 years ago
- This extension replaces the default repeater tab name with the URL path of the repeater request.☆24Sep 3, 2021Updated 4 years ago
- CMSC389R course at UMD☆11Oct 2, 2019Updated 6 years ago
- RNN-based IDS for SOME/IP Intrusion Detection☆10Jul 20, 2021Updated 4 years ago
- ☆14Nov 12, 2024Updated last year
- Binary exploitation CTF challenge☆24Nov 27, 2018Updated 7 years ago
- Crosswalk Nessus findings with the CISA Known and Exploited Vulnerabilities (KEV) catalog.☆12Mar 21, 2023Updated 3 years ago
- Learn the basics of cryptography throughout history.☆21Jan 30, 2021Updated 5 years ago
- Checks if out-of-bailiwick hostnames of a zone are resolvable☆18Dec 19, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Dynamic netflow graphs for nfdump☆14Sep 3, 2015Updated 10 years ago
- GitHub Pages repository for https://guedou.github.io☆11Apr 7, 2026Updated last week
- Queries for parsed spotlight database in sqlite☆13Dec 29, 2020Updated 5 years ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆26Jul 18, 2019Updated 6 years ago
- Anteater is Reconnaissance tool for discovering interesting files and folders in a web application that most likely has been misconfigure…☆13Jun 12, 2024Updated last year
- A simple and cross-platform Remote Administration Tool written in Ruby☆15Sep 13, 2017Updated 8 years ago
- [EMNLP Findings 2025]. NLP-ADBench is a comprehensive benchmarking tool designed for Anomaly Detection in Natural Language Processing (NL…☆21Oct 9, 2025Updated 6 months ago
- Create HTML profiling reports from pandas DataFrame objects☆12May 19, 2020Updated 5 years ago
- ☆27Feb 3, 2026Updated 2 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Lazy SPL to detect Spring4Shell exploitation☆12Jul 8, 2022Updated 3 years ago
- single-threaded event driven sleep obfuscation poc for linux☆38Jun 14, 2025Updated 10 months ago
- GUI for regripper☆11Mar 19, 2019Updated 7 years ago
- Field guide to gather low-hanging fruits☆14Mar 20, 2025Updated last year
- Scripts to for ready-to-use Velociraptor instance deployment in Azure☆14Jun 27, 2023Updated 2 years ago
- ☆25Feb 11, 2024Updated 2 years ago
- My Linux profiles built for Volatility 2/3☆10Oct 11, 2025Updated 6 months ago