strongX509 / cyberLinks
A collection of cyber tutorials including Python examples
☆15Updated 3 years ago
Alternatives and similar repositories for cyber
Users that are interested in cyber are comparing it to the libraries listed below
Sorting:
- Curated list of awesome, open source data exfiltration tools☆64Updated 4 years ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆73Updated last year
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆95Updated 4 years ago
- Internal Network Penetration Test Playbook☆20Updated 4 years ago
- Collection of danish base wordlists for cracking danish passwords (Hashcat, John the Ripper etc.)☆28Updated 2 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Updated 3 years ago
- Publicly availalbe vulnarble by desgin vm/machines☆43Updated 3 years ago
- An optimized Python3 library to fetch the most recent exploit-database, create searchable indexes for CVE->EDBID and EDBID -> CVE, and pr…☆30Updated last year
- Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Cont…☆50Updated last year
- NSE script which leverages the Censys Search API for passive data collection☆58Updated 3 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆20Updated 2 years ago
- A learning and testing environment for web application hacking and pentesting.☆27Updated 4 years ago
- Penetration Testing Lab☆27Updated 11 years ago
- BSidesRoc 2022 Linux Malware/Forensics Course☆76Updated 3 years ago
- ☆25Updated 5 months ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆44Updated 4 years ago
- A collection of Script for Red Team & Incidence Response☆11Updated 3 years ago
- Commands used in Windows penetration tests☆55Updated last month
- Bulk hostname lookup using shodan☆14Updated 3 years ago
- Extract credentials and other useful info from network captures☆74Updated 3 years ago
- Tool to identify routers on the local LAN and paths to the Internet☆66Updated last year
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆25Updated 3 years ago
- Dictionary cracking tool for HTTP Digest challenge/response hashes☆32Updated 2 years ago
- Collaborative pentest tool with highly customizable tools☆75Updated 3 years ago
- ☆24Updated 6 years ago
- Field guide to gather low-hanging fruits☆13Updated 8 months ago
- Script to automate, when possible, the passive reconnaissance performed on a website prior to an assessment.☆38Updated last week
- An introduction on how to build a multithreaded ping sweeper and port scanner with Python 3☆28Updated 4 years ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆23Updated 2 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated last year