A collection of cyber tutorials including Python examples
☆17Oct 10, 2022Updated 3 years ago
Alternatives and similar repositories for cyber
Users that are interested in cyber are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Pipeleek scans CI/CD logs and artifacts to detect leaked secrets and pivot from them☆19Updated this week
- An Arduino sketch for the Adafruit SCD4X and SCD-30 CO2 sensor running on an ESP32 with an http server.☆19May 31, 2025Updated 11 months ago
- Install Script for CS☆11Aug 26, 2019Updated 6 years ago
- Windows Application Attack Surface Analyzer☆24Feb 22, 2024Updated 2 years ago
- Learn about a network from a pcap file or reading from an interface☆29Apr 6, 2024Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆11Jun 21, 2018Updated 7 years ago
- CVE-2021-1994、CVE-2021-2047、CVE-2021-2064、CVE-2021-2108、CVE-2021-2075、CVE-2019-17195、CVE-2020-14756、CVE-2021-2109☆12Sep 13, 2021Updated 4 years ago
- The rev.ng demos☆13Mar 11, 2026Updated last month
- Issues to consider when planning a red team exercise.☆14Aug 23, 2017Updated 8 years ago
- A companion repo to accompany detailed guides and YouTube content to allow users to follow along☆13Aug 29, 2020Updated 5 years ago
- ☆16May 17, 2018Updated 7 years ago
- ☆12Aug 8, 2024Updated last year
- ☆10Jan 3, 2023Updated 3 years ago
- ☆11Dec 4, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Your Open-Source SOC Assistant☆12Apr 5, 2023Updated 3 years ago
- Publicly-available tools from Rogue Valley Information Security☆14Feb 5, 2025Updated last year
- Priv8 Tools Software Mass Dork Auto Exploit.☆12Feb 1, 2023Updated 3 years ago
- DES Rainbow Table Online Phase☆24Aug 2, 2017Updated 8 years ago
- Reproducing feature engineering & oversampling experiments on TPEHG DB and assessing the real impact of over-sampling☆16Jan 19, 2020Updated 6 years ago
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆25Aug 1, 2022Updated 3 years ago
- Lists of hacking: Blog, Forums, Telegram channel and all kind of resources in spanish and english.☆15Mar 7, 2021Updated 5 years ago
- This extension replaces the default repeater tab name with the URL path of the repeater request.☆24Sep 3, 2021Updated 4 years ago
- ☆14Nov 12, 2024Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Binary exploitation CTF challenge☆24Nov 27, 2018Updated 7 years ago
- Crosswalk Nessus findings with the CISA Known and Exploited Vulnerabilities (KEV) catalog.☆12Mar 21, 2023Updated 3 years ago
- ☆11Jan 2, 2023Updated 3 years ago
- Dynamic netflow graphs for nfdump☆14Sep 3, 2015Updated 10 years ago
- Learn the basics of cryptography throughout history.☆21Jan 30, 2021Updated 5 years ago
- ☆12Updated this week
- Burp extension for quickly copying request/response data.☆31Feb 12, 2026Updated 2 months ago
- Essential playbooks & runbooks for cybersecurity operations. A dynamic resource for security pros to navigate digital threats, with best …☆17Apr 14, 2025Updated last year
- GitHub Pages repository for https://guedou.github.io☆11Apr 7, 2026Updated 3 weeks ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Queries for parsed spotlight database in sqlite☆13Dec 29, 2020Updated 5 years ago
- Anteater is Reconnaissance tool for discovering interesting files and folders in a web application that most likely has been misconfigure…☆14Jun 12, 2024Updated last year
- A simple and cross-platform Remote Administration Tool written in Ruby☆15Sep 13, 2017Updated 8 years ago
- [EMNLP Findings 2025]. NLP-ADBench is a comprehensive benchmarking tool designed for Anomaly Detection in Natural Language Processing (NL…☆21Oct 9, 2025Updated 6 months ago
- Create HTML profiling reports from pandas DataFrame objects☆12May 19, 2020Updated 5 years ago
- ☆27Feb 3, 2026Updated 3 months ago
- CIDDS: A Configurable and Interactive DAG-based Distributed Ledger Simulation Framework☆15Nov 22, 2022Updated 3 years ago