urcuqui / WhiteHatLinks
A collection of AI-powered tools for phishing detection, adversarial machine learning, and cybersecurity research. Includes Streamlit/Flask apps, attack simulations, LoRA fine-tuning, and secure model evaluation for red teaming and defense.
☆104Updated last month
Alternatives and similar repositories for WhiteHat
Users that are interested in WhiteHat are comparing it to the libraries listed below
Sorting:
- Penetration Testing, Vulnerability Assessment and Red Team Learning☆134Updated last month
- the open source way to do the excercises to be a Full-Stack Cybersecurity Engineer. added with the recent paper in the field of Machine …☆50Updated 4 years ago
- A collection of useful links for Pentesters☆170Updated 5 months ago
- Writeups for all the HTB machines I have done☆64Updated 2 years ago
- Resource Dump For Learning Cybersec-related Concepts☆25Updated 5 years ago
- A curated list of awesome infosec blog posts, courses, books and more!☆104Updated 5 years ago
- Offensive Security / Pentesting Cheat Sheets☆102Updated 7 years ago
- A massive, curated collection of information security books, study guides, cheat sheets, and resources. This library is intended for educ…☆135Updated last month
- My documentation and tools for learn ethical hacking.☆146Updated 3 weeks ago
- Use Tor for anonymous scanning with nmap☆85Updated 10 years ago
- Curated list of awesome cybersecurity companies and solutions.☆159Updated last year
- ☆254Updated last year
- Awesome Penetration Testing A collection of awesome penetration testing resources☆253Updated 2 years ago
- Penetration Testing/Security Cheatsheets☆62Updated 10 years ago
- A collection of forensics tools, software, libraries, learning tutorials, frameworks, academic and practical resources in Cybersecurity☆63Updated 3 years ago
- Awestome list of pentesting resources.☆120Updated 2 years ago
- ☆22Updated 9 years ago
- ToolsWatch and Black Hat Arsenal selection of badges☆57Updated last year
- Major tools used for Digital Forensic Investigation, includes tools used for Image, Audio, Memory, Network and Disk Image data analysis. …☆87Updated 5 years ago
- Who and what to follow in the world of cyber security☆150Updated 5 years ago
- Portable and flexible web application security assessment tool.It parses Burp Suite log and performs various tests depending on the modul…☆36Updated 10 years ago
- DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)☆15Updated 4 years ago
- Stay up-to-date with the latest and greatest ethical hacking tools and resources.☆41Updated 3 years ago
- Resources for learning about application security☆56Updated 8 years ago
- CHEAT SHEET DE SEGURIDAD PARA ETHICAL HACKING & PENETRATION TESTING☆26Updated 8 years ago
- Various Cheat Sheets (e.g. Nmap, Metasploit, Common Ports, Subnetting, Wireshark, etc)☆53Updated 5 years ago
- Penetration Testing Checklist☆37Updated 5 years ago
- ☆48Updated 7 years ago
- Awesome Hardware Hacking - It contains notes and resources for hacking into hardware. Open for contributions, add writeup/blogs links on…☆54Updated 3 years ago
- Writeups for Hack The Box machines/challenges☆25Updated 4 years ago