strongX509 / cyberLinks
A collection of cyber tutorials including Python examples
☆16Updated 2 years ago
Alternatives and similar repositories for cyber
Users that are interested in cyber are comparing it to the libraries listed below
Sorting:
- Curated list of awesome, open source data exfiltration tools☆61Updated 3 years ago
- This contains a list of Blue Team Tools that I use daily, and have stored here for reference.☆34Updated 7 years ago
- NSE script which leverages the Censys Search API for passive data collection☆59Updated 3 years ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆95Updated 4 years ago
- Publicly availalbe vulnarble by desgin vm/machines☆31Updated 3 years ago
- Tracking my journey towards earning my OSCP. This includes the process of everything that I learn along the way.☆47Updated 3 years ago
- A learning and testing environment for web application hacking and pentesting.☆27Updated 4 years ago
- 🐑 Websheep is an app based on a willingly vulnerable ReSTful APIs.☆56Updated last year
- Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Cont…☆48Updated last year
- Penetration Testing Lab☆26Updated 11 years ago
- ☆10Updated 2 years ago
- Bulk hostname lookup using shodan☆15Updated 3 years ago
- Phishing campaign docker composition for Gophish☆42Updated last week
- Collaborative pentest tool with highly customizable tools☆75Updated 3 years ago
- Run Capture the Flags and Security Trainings with OWASP WrongSecrets☆50Updated this week
- Internal Network Penetration Test Playbook☆21Updated 4 years ago
- ☆35Updated 2 years ago
- Dictionary cracking tool for HTTP Digest challenge/response hashes☆32Updated 2 years ago
- WordPress version identification and vulnerability finder.☆31Updated 2 years ago
- Various commands, tools, techniques that you can use to examine live Windows systems for signs of Compromise or for Threat Hunting.Can al…☆12Updated 2 years ago
- ☆22Updated last month
- Commands used in Windows penetration tests☆54Updated 3 years ago
- Virtual machines that are set up with a variety of known vulnerabilities.☆15Updated 3 years ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆70Updated last year
- ☆11Updated 3 years ago
- Python script that runs Masscan against an IP to collect open ports, feed those ports to Nmap, which finds service versions and runs defa…☆23Updated 4 years ago
- Small enough to carry on your back (Backpack) 🎒💻☆32Updated 2 years ago
- Field guide to gather low-hanging fruits☆13Updated 4 months ago
- New Framework Red Team Operations☆18Updated 4 years ago
- Files for my Python3 Create Your Own Tool Series☆25Updated 3 years ago