strongX509 / cyberLinks
A collection of cyber tutorials including Python examples
☆17Updated 3 years ago
Alternatives and similar repositories for cyber
Users that are interested in cyber are comparing it to the libraries listed below
Sorting:
- Curated list of awesome, open source data exfiltration tools☆62Updated 4 years ago
- An optimized Python3 library to fetch the most recent exploit-database, create searchable indexes for CVE->EDBID and EDBID -> CVE, and pr…☆30Updated last year
- Tracking my journey towards earning my OSCP. This includes the process of everything that I learn along the way.☆47Updated 4 years ago
- The results of my small term paper on the topic of the Internet of Vulnerable Things and the exploit for CVE-2022-48194.☆19Updated 3 years ago
- Penetration Testing Lab☆28Updated 11 years ago
- Run Capture the Flags and Security Trainings with OWASP WrongSecrets☆54Updated last week
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆83Updated 5 years ago
- A learning and testing environment for web application hacking and pentesting.☆27Updated 5 years ago
- ☆25Updated 7 months ago
- Collaborative pentest tool with highly customizable tools☆73Updated 4 years ago
- Honeyscanner: A vulnerability analyzer for honeypots☆58Updated last month
- New Framework Red Team Operations☆20Updated 4 years ago
- This is the official repository for Basic Malware Analysis Course☆20Updated 4 years ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆78Updated 2 years ago
- ☆65Updated 6 years ago
- Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Cont…☆50Updated last year
- Commands used in Windows penetration tests☆55Updated 3 weeks ago
- Simple Phishing Toolkit is a super easy to install and use phishing framework built to help Information Security professionals find human…☆29Updated 7 years ago
- WordPress version identification and vulnerability finder.☆31Updated 3 years ago
- ☆22Updated 9 years ago
- NSE script which leverages the Censys Search API for passive data collection☆58Updated 4 years ago
- ☆30Updated 2 years ago
- ☆22Updated 7 years ago
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆135Updated last week
- ☆24Updated 6 years ago
- Ethical hacking, CTF, tools & etc☆22Updated 4 years ago
- Major tools used for Digital Forensic Investigation, includes tools used for Image, Audio, Memory, Network and Disk Image data analysis. …☆86Updated 5 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 3 years ago
- ☆21Updated 8 years ago
- Resources for learning about application security☆56Updated 9 years ago