strongX509 / cyberLinks
A collection of cyber tutorials including Python examples
☆16Updated 2 years ago
Alternatives and similar repositories for cyber
Users that are interested in cyber are comparing it to the libraries listed below
Sorting:
- Curated list of awesome, open source data exfiltration tools☆62Updated 3 years ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆71Updated last year
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆57Updated last year
- Configuration security analyzer for network devices. Pynipper-ng is an evolution of nipper-ng, updated and translated to python. [ALPHA v…☆29Updated 2 months ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆95Updated 4 years ago
- Run Capture the Flags and Security Trainings with OWASP WrongSecrets☆52Updated last week
- an OSINT tool to scrape sub domains from the Virus Total API☆23Updated 2 years ago
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆81Updated 4 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 10 months ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆22Updated 2 years ago
- NSE script which leverages the Censys Search API for passive data collection☆58Updated 3 years ago
- Unique hashes.org "founds" sorted by occurrence. (November 2019)☆81Updated 5 years ago
- Penetration Testing Lab☆26Updated 11 years ago
- Commands used in Windows penetration tests☆54Updated 3 years ago
- Create visualization from Shodan query☆75Updated 4 years ago
- A learning and testing environment for web application hacking and pentesting.☆27Updated 4 years ago
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆44Updated 2 years ago
- Repository and archive for Killing The Bear Gitbook☆83Updated 2 years ago
- URL fingerprinting made easy☆89Updated last year
- 🐑 Websheep is an app based on a willingly vulnerable ReSTful APIs.☆56Updated last year
- This is a simple Python script that connects to a MISP instance and retrieves attributes of specific types (such as IP addresses, URLs, a…☆16Updated 2 years ago
- Jupyter Notebooks for the Blue Team☆36Updated 8 months ago
- ☆17Updated 8 years ago
- Accompanying documentation, images, source code and other stuff from the cybernomad.online blog☆28Updated 5 years ago
- Script for importing Nmap results into a Neo4j Graph Database☆23Updated 4 months ago
- This contains a list of Blue Team Tools that I use daily, and have stored here for reference.☆35Updated 7 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆25Updated 3 years ago
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆48Updated 2 years ago
- Internal Network Penetration Test Playbook☆21Updated 4 years ago
- ☆22Updated 3 months ago