Cybersecurity Resources
☆61Oct 6, 2024Updated last year
Alternatives and similar repositories for resources
Users that are interested in resources are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆13Dec 31, 2024Updated last year
- HackLiners: CyberSec/BugHunting OneLiners☆62Oct 16, 2024Updated last year
- The Vulnerability Assessment project aims to identify and address security vulnerabilities in a Windows 10 virtual machine (VM). Using N…☆18Mar 4, 2024Updated 2 years ago
- a simple keylogger in python that sends the keystrokes to the server (Telegram)☆23Updated this week
- Welcome to my GitHub repository housing comprehensive handwritten notes from the IBM Cybersecurity Analyst Professional certification. Di…☆23Feb 27, 2024Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Reflector: A tool to check for reflected query parameter values.☆12Jan 13, 2023Updated 3 years ago
- An ongoing curated collection of awesome software, libraries, frameworks, talks & videos, best practices, learning tutorials and importan…☆21Jul 29, 2022Updated 3 years ago
- An automated bug hunting tool for comprehensive reconnaissance, including subdomain enumeration, port scanning, vulnerability detection, …☆13Jun 24, 2025Updated 9 months ago
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environments☆12Nov 23, 2023Updated 2 years ago
- ☆21Dec 8, 2022Updated 3 years ago
- A super-fast proxy server port scanner一个超级快的端口扫描器☆24Aug 31, 2025Updated 7 months ago
- A Flexible, Modular ML Experiment Framework☆12Jan 22, 2020Updated 6 years ago
- 100 Hacking Tools and Resources☆109Jun 27, 2023Updated 2 years ago
- SubScout: Discover Hidden Subdomains Effortlessly☆15Oct 14, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- In this repository, B.Sc. in Computer Science & Engineering courses and topics. Here some of my completed courses slide, assignment, hand…☆11May 31, 2025Updated 10 months ago
- This repository provides a comprehensive Digital Footprint Checklist to help individuals manage their online presence and enhance privacy…☆17Dec 25, 2024Updated last year
- BlitzSSH is a multi-threaded SSH brute-force tool with Telegram integration for real-time notifications.☆15Nov 20, 2025Updated 4 months ago
- Resources for Competitive Programming☆18Jul 20, 2023Updated 2 years ago
- Welcome to TheCyberHUB, a community-driven platform for hackers, cybersecurity enthusiasts, and IT professionals. Our platform provides a…☆179Apr 4, 2026Updated last week
- Cyber Security Handbook☆156Jul 12, 2023Updated 2 years ago
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆53Oct 23, 2024Updated last year
- Cross platform Agile Data Analytics for .NET☆23Apr 7, 2026Updated last week
- PortScout: Fast and Reliable Port Scanning Made Simple☆23Oct 14, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A checklist for systematically going through the OWASP Testing Guide V4☆17Jan 14, 2025Updated last year
- ☆13May 10, 2025Updated 11 months ago
- Wi-Fi Deauther is a command-line utility for educational purposes, enabling users to perform Wi-Fi network actions such as scanning, deau…☆57Nov 2, 2023Updated 2 years ago
- ☆19Dec 5, 2024Updated last year
- anveshan is a completed script that helps to automate your recon process, It finds subdomains, urls, js files, parameters, screenshots, a…☆30Oct 29, 2024Updated last year
- Path to a free self-taught education in Computer Science!☆14Mar 31, 2018Updated 8 years ago
- CyberSecurity Resources and Tools☆30Jun 24, 2024Updated last year
- A keylogger, sometimes called a keystroke logger or keyboard capture, is a type of surveillance technology used to monitor and record eac…☆18Jul 29, 2024Updated last year
- Hands-on cybersecurity projects to enhance skills in phishing investigation, malware analysis, network intrusion detection, and DDoS atta…☆253Jun 3, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ww☆14Mar 20, 2025Updated last year
- Red Team Operations Framework☆24Jul 14, 2024Updated last year
- ☆20Oct 21, 2025Updated 5 months ago
- Automation script to download JSON MISP files from a SFTP server and import them via API to a MISP instance.☆15May 12, 2023Updated 2 years ago
- This is about learning data scientist with R 2019 courses in DataCamp. All the answers given written by myself Data Scientist with R tra…☆15Aug 28, 2019Updated 6 years ago
- Use AI to install penetration testing tool suites in one click.☆75Oct 5, 2025Updated 6 months ago
- It is a advanced keylogger.☆77Jul 2, 2024Updated last year