phisherpriceAll In One Pentesting Tool For Recon & Auditing , Phone Number Lookup , Header , SSH Scan , SSL/TLS Scan & Much More.
Stars: ✭ 38 (-54.22%)
Mutual labels: cybersecurity, cyber-security
cyberopsCisco Press CCNA Cyber Ops Books and Video Courses supplemental information and additional study materials.
Stars: ✭ 18 (-78.31%)
Mutual labels: cybersecurity, cyber-security
Reverse-EngineeringA FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Stars: ✭ 7,234 (+8615.66%)
Mutual labels: cybersecurity, cyber-security
LuciferA Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Use Or Build Automation Modules To Speed Up Your Cyber Security Life
Stars: ✭ 302 (+263.86%)
Mutual labels: cybersecurity, cyber-security
OpenVAS-DockerA Docker Image For the Open Vulnerability Assessment Scanner (OpenVAS)
Stars: ✭ 16 (-80.72%)
Mutual labels: cybersecurity, cyber-security
rawsec-cybersecurity-inventoryAn inventory of tools and resources about CyberSecurity that aims to help people to find everything related to CyberSecurity.
Stars: ✭ 153 (+84.34%)
Mutual labels: cybersecurity, cyber-security
robot hacking manualRobot Hacking Manual (RHM). From robotics to cybersecurity. Papers, notes and writeups from a journey into robot cybersecurity.
Stars: ✭ 169 (+103.61%)
Mutual labels: cybersecurity, cyber-security
argusArgus Advanced Remote & Local Keylogger For macOS and Windows
Stars: ✭ 87 (+4.82%)
Mutual labels: cybersecurity, cyber-security
ReversePowerShellFunctions that can be used to gain Reverse Shells with PowerShell
Stars: ✭ 48 (-42.17%)
Mutual labels: cybersecurity, cyber-security
Zeek-Network-Security-MonitorA Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the necessary hardware and setup and finally provide some examples of how you can use the power of Zeek to have absolute control over your network.
Stars: ✭ 38 (-54.22%)
Mutual labels: cybersecurity, cyber-security
who and what to followWho and what to follow in the world of cyber security
Stars: ✭ 124 (+49.4%)
Mutual labels: cybersecurity, cyber-security
tryhackme-ctfTryHackMe CTFs writeups, notes, drafts, scrabbles, files and solutions.
Stars: ✭ 140 (+68.67%)
Mutual labels: cybersecurity, cyber-security
NIST-to-TechAn open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)
Stars: ✭ 61 (-26.51%)
Mutual labels: cybersecurity, cyber-security
URL-obfuscatorPython Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscation techniques.
Stars: ✭ 101 (+21.69%)
Mutual labels: cybersecurity, cyber-security
SherlockThis script is designed to help expedite a web application assessment by automating some of the assessment steps (e.g., running nmap, sublist3r, metasploit, etc.)
Stars: ✭ 36 (-56.63%)
Mutual labels: cybersecurity, cyber-security
Reverse Engineering TutorialA FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Stars: ✭ 5,763 (+6843.37%)
Mutual labels: cybersecurity, cyber-security
CloudFrontierMonitor the internet attack surface of various public cloud environments. Currently supports AWS, GCP, Azure, DigitalOcean and Oracle Cloud.
Stars: ✭ 102 (+22.89%)
Mutual labels: cybersecurity, cyber-security
reosploitA Tool that Finds, Enumerates, and Exploits Reolink Cameras.
Stars: ✭ 89 (+7.23%)
Mutual labels: cybersecurity
LabtainersLabtainers: A Docker-based cyber lab framework
Stars: ✭ 226 (+172.29%)
Mutual labels: cybersecurity
ICS-Security-ProductsLists of products useful for ICS security
Stars: ✭ 78 (-6.02%)
Mutual labels: cybersecurity