strongX509 / cyberLinks
A collection of cyber tutorials including Python examples
☆15Updated 3 years ago
Alternatives and similar repositories for cyber
Users that are interested in cyber are comparing it to the libraries listed below
Sorting:
- Curated list of awesome, open source data exfiltration tools☆62Updated 4 years ago
- ☆25Updated 7 months ago
- Run Capture the Flags and Security Trainings with OWASP WrongSecrets☆54Updated last week
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆45Updated 2 years ago
- NSE script which leverages the Censys Search API for passive data collection☆58Updated 4 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 3 years ago
- Tracking my journey towards earning my OSCP. This includes the process of everything that I learn along the way.☆47Updated 4 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆76Updated last year
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆82Updated 5 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆20Updated 2 years ago
- Script for importing Nmap results into a Neo4j Graph Database☆24Updated 8 months ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆24Updated 2 years ago
- A collection of Script for Red Team & Incidence Response☆11Updated 3 years ago
- Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Cont…☆50Updated last year
- This contains a list of Blue Team Tools that I use daily, and have stored here for reference.☆34Updated 8 years ago
- OWASP Foundation Web Respository☆25Updated 3 weeks ago
- An optimized Python3 library to fetch the most recent exploit-database, create searchable indexes for CVE->EDBID and EDBID -> CVE, and pr…☆30Updated last year
- Shodan Monitoring integration for TheHive.☆130Updated last year
- Assorted scripts I made for Red Teaming / Pen Testing☆14Updated last year
- Jupyter Notebooks for the Blue Team☆39Updated last year
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆124Updated last month
- Virtual machines that are set up with a variety of known vulnerabilities.☆17Updated 3 years ago
- Melee: Tool to Detect Infections in MySQL Instances☆22Updated 2 years ago
- Internal Network Penetration Test Playbook☆20Updated 4 years ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆77Updated last year
- New Framework Red Team Operations☆19Updated 4 years ago
- Dictionary cracking tool for HTTP Digest challenge/response hashes☆32Updated 2 years ago
- ☆34Updated 2 years ago
- Collaborative pentest tool with highly customizable tools☆73Updated 4 years ago
- Top password lists generated from leaks collected from different paste sites☆32Updated 3 years ago