thecyberhex / awesome-securityLinks
A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.
☆14Updated 8 years ago
Alternatives and similar repositories for awesome-security
Users that are interested in awesome-security are comparing it to the libraries listed below
Sorting:
- Free Security and Hacking eBooks☆17Updated 7 years ago
- A collection of python scripts that are used for network analysis and testing.☆58Updated 6 years ago
- Digital Forensics with Kali Linux, published by Packt☆96Updated 2 years ago
- 🔺 Red Team Hardware Toolkit 🔺☆342Updated 5 years ago
- Mastering Kali Linux for Advanced Penetration Testing Third Edition, published by Packt☆73Updated 4 years ago
- Python3 Nmap Scanner☆111Updated last year
- Metasploit Cheat Sheet 💣☆455Updated 5 years ago
- List of commands and techniques to while conducting any kind of hacking :)☆136Updated 2 years ago
- GUI based offensive penetration testing tool (Open Source)☆219Updated 3 months ago
- The main SamuraiWTF collaborative distro repo.☆539Updated 7 months ago
- Mastering Kali Linux for Advanced Penetration Testing - Second Edition, published by Packt☆63Updated 2 years ago
- Maltego Penetration Testing Transforms☆374Updated 6 years ago
- Wireshark Cheat Sheet☆403Updated 4 years ago
- This repository is to make life of the pentester easy as it is a collection of the websites that can be used by pentesters for day to day…☆375Updated last year
- CEHv9 - Practice Exam Questions with Answers☆69Updated 7 years ago
- black hat python☆134Updated 4 years ago
- Kali Linux - An Ethical Hacker's Cookbook, published by Packt☆48Updated 2 years ago
- A modular recon tool for pentesting☆260Updated 7 years ago
- Ethical hacking python scripts developed based on the course Python & Ethical Hacking From Scratch by Zaid Sabih☆137Updated 6 years ago
- Both personal and public notes for EC-Council's CEHv10 312-50, because it's thousands of pages/slides of boredom, and a braindump to man…☆245Updated 5 years ago
- A unified console to perform the "kill chain" stages of attacks.☆206Updated 2 years ago
- A curated list of Awesome Threat Intelligence resources☆34Updated 7 years ago
- Who and what to follow in the world of cyber security☆149Updated 5 years ago
- This is a learning created by Omar Santos (@santosomar) for different Cybersecurity training sessions. It includes many intentionally vul…☆391Updated 3 months ago
- Let's find someone's account☆164Updated 6 years ago
- All my Hacking|Pentesting Notes☆331Updated 9 years ago
- A Phishing Dropper designed to Pentest.☆274Updated 8 years ago
- A montage of ethical hacking based resources, please ensure you do not upload anything that violates copyright law☆12Updated 4 years ago
- CEHv10 Study Guide++☆28Updated 4 years ago
- A collection of penetration testing tools written in Python 2☆14Updated 6 years ago