strongX509 / cyberLinks
A collection of cyber tutorials including Python examples
☆16Updated 2 years ago
Alternatives and similar repositories for cyber
Users that are interested in cyber are comparing it to the libraries listed below
Sorting:
- Curated list of awesome, open source data exfiltration tools☆61Updated 3 years ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆71Updated last year
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆95Updated 4 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆25Updated 3 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆19Updated last year
- Reads and prints information from the website MalAPI.io☆39Updated 3 years ago
- Jupyter Notebooks for the Blue Team☆36Updated 7 months ago
- An optimized Python3 library to fetch the most recent exploit-database, create searchable indexes for CVE->EDBID and EDBID -> CVE, and pr…☆30Updated 10 months ago
- 🐑 Websheep is an app based on a willingly vulnerable ReSTful APIs.☆56Updated last year
- Tracking my journey towards earning my OSCP. This includes the process of everything that I learn along the way.☆47Updated 3 years ago
- ☆22Updated 2 months ago
- WordPress version identification and vulnerability finder.☆31Updated 2 years ago
- Penetration Testing Lab☆26Updated 11 years ago
- Collection of danish base wordlists for cracking danish passwords (Hashcat, John the Ripper etc.)☆27Updated 2 years ago
- Create visualization from Shodan query☆75Updated 4 years ago
- SMBScan is a tool to enumerate file shares on an internal network.☆46Updated 2 months ago
- Collaborative pentest tool with highly customizable tools☆76Updated 3 years ago
- A learning and testing environment for web application hacking and pentesting.☆27Updated 4 years ago
- Script for importing Nmap results into a Neo4j Graph Database☆23Updated 4 months ago
- Configuration security analyzer for network devices. Pynipper-ng is an evolution of nipper-ng, updated and translated to python. [ALPHA v…☆27Updated last month
- nmap scripts (nse files) to identify vulnerabilities☆30Updated 2 weeks ago
- ☆80Updated 2 years ago
- Anteater is Reconnaissance tool for discovering interesting files and folders in a web application that most likely has been misconfigure…☆12Updated last year
- Unique hashes.org "founds" sorted by occurrence. (November 2019)☆80Updated 5 years ago
- Internal Network Penetration Test Playbook☆21Updated 4 years ago
- Simple Phishing Toolkit is a super easy to install and use phishing framework built to help Information Security professionals find human…☆27Updated 7 years ago
- Low Interaction Mobile Honeypot☆95Updated 2 months ago
- URL fingerprinting made easy☆89Updated last year
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 9 months ago
- ☆24Updated 6 years ago