A collection of cyber tutorials including Python examples
☆17Oct 10, 2022Updated 3 years ago
Alternatives and similar repositories for cyber
Users that are interested in cyber are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- OWASP Foundation Web Respository☆11Jan 14, 2026Updated 2 months ago
- Install Script for CS☆11Aug 26, 2019Updated 6 years ago
- A collection of docker image build files☆63Dec 3, 2024Updated last year
- Windows Application Attack Surface Analyzer☆24Feb 22, 2024Updated 2 years ago
- 🐞 Understand how cross-site scripting occurs, how to detect and exploit XSS vulnerabilities, giving you control of other visitor's brows…☆13Nov 24, 2025Updated 4 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Learn about a network from a pcap file or reading from an interface☆29Apr 6, 2024Updated last year
- ☆15May 17, 2018Updated 7 years ago
- CVE-2021-1994、CVE-2021-2047、CVE-2021-2064、CVE-2021-2108、CVE-2021-2075、CVE-2019-17195、CVE-2020-14756、CVE-2021-2109☆12Sep 13, 2021Updated 4 years ago
- miniDSP BEQ Files☆10Nov 7, 2023Updated 2 years ago
- Issues to consider when planning a red team exercise.☆14Aug 23, 2017Updated 8 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Apr 25, 2022Updated 3 years ago
- A companion repo to accompany detailed guides and YouTube content to allow users to follow along☆13Aug 29, 2020Updated 5 years ago
- ☆12Aug 8, 2024Updated last year
- my programming / infosec scratchpad☆11Apr 25, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆10Jan 3, 2023Updated 3 years ago
- ☆11Dec 4, 2024Updated last year
- Publicly-available tools from Rogue Valley Information Security☆14Feb 5, 2025Updated last year
- DES Rainbow Table Online Phase☆24Aug 2, 2017Updated 8 years ago
- Reproducing feature engineering & oversampling experiments on TPEHG DB and assessing the real impact of over-sampling☆16Jan 19, 2020Updated 6 years ago
- Lists of hacking: Blog, Forums, Telegram channel and all kind of resources in spanish and english.☆15Mar 7, 2021Updated 5 years ago
- This extension replaces the default repeater tab name with the URL path of the repeater request.☆24Sep 3, 2021Updated 4 years ago
- CMSC389R course at UMD☆11Oct 2, 2019Updated 6 years ago
- Some #bada55 front-end developer resources, curated and loved by @sodevious☆19Oct 3, 2014Updated 11 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- RNN-based IDS for SOME/IP Intrusion Detection☆10Jul 20, 2021Updated 4 years ago
- ☆14Nov 12, 2024Updated last year
- Binary exploitation CTF challenge☆24Nov 27, 2018Updated 7 years ago
- Crosswalk Nessus findings with the CISA Known and Exploited Vulnerabilities (KEV) catalog.☆12Mar 21, 2023Updated 3 years ago
- Learn the basics of cryptography throughout history.☆21Jan 30, 2021Updated 5 years ago
- Burp extension for quickly copying request/response data.☆31Feb 12, 2026Updated last month
- HIBP Audit - Audit Active Directory user accounts against HIBP☆15Sep 23, 2021Updated 4 years ago
- Dynamic netflow graphs for nfdump☆14Sep 3, 2015Updated 10 years ago
- A Claude Skill to assist with family history and genealogy research planning.☆45Dec 7, 2025Updated 3 months ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Secure (ST31) SDK for Ledger Blue☆14Jul 27, 2018Updated 7 years ago
- Queries for parsed spotlight database in sqlite☆13Dec 29, 2020Updated 5 years ago
- NodeJS bitcoin.de API☆10Jun 25, 2018Updated 7 years ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆26Jul 18, 2019Updated 6 years ago
- Anteater is Reconnaissance tool for discovering interesting files and folders in a web application that most likely has been misconfigure…☆13Jun 12, 2024Updated last year
- A wide range of content management systems☆32Aug 6, 2014Updated 11 years ago
- A simple and cross-platform Remote Administration Tool written in Ruby☆15Sep 13, 2017Updated 8 years ago