All Projects โ†’ MrM8BRH โ†’ SuperLibrary

MrM8BRH / SuperLibrary

Licence: MIT license
Information Security Library

Projects that are alternatives of or similar to SuperLibrary

Defaultcreds Cheat Sheet
One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password ๐Ÿ›ก๏ธ
Stars: โœญ 1,949 (+3148.33%)
Mutual labels:  cybersecurity, infosec, bugbounty, offensive-security
Xxe Injection Payload List
๐ŸŽฏ XML External Entity (XXE) Injection Payload List
Stars: โœญ 304 (+406.67%)
Mutual labels:  cybersecurity, infosec, bugbounty
pyc2bytecode
A Python Bytecode Disassembler helping reverse engineers in dissecting Python binaries by disassembling and analyzing the compiled python byte-code(.pyc) files across all python versions (including Python 3.10.*)
Stars: โœญ 70 (+16.67%)
Mutual labels:  cybersecurity, infosec, malware-analysis
flydns
Related subdomains finder
Stars: โœญ 29 (-51.67%)
Mutual labels:  infosec, bugbounty, network-security
Malware-Sample-Sources
Malware Sample Sources
Stars: โœญ 214 (+256.67%)
Mutual labels:  cybersecurity, infosec, malware-analysis
Jasmin-Ransomware
Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security researchers to overcome the risk of external attacks.
Stars: โœญ 84 (+40%)
Mutual labels:  cybersecurity, bugbounty, kali-linux
PyIris
PyIris is a modular remote access trojan toolkit written in python targeting Windows and Linux systems.
Stars: โœญ 296 (+393.33%)
Mutual labels:  cybersecurity, infosec, kali-linux
Nosqlmap
Automated NoSQL database enumeration and web application exploitation tool.
Stars: โœญ 1,928 (+3113.33%)
Mutual labels:  bugbounty, offensive-security, web-application-security
Malice
VirusTotal Wanna Be - Now with 100% more Hipster
Stars: โœญ 1,253 (+1988.33%)
Mutual labels:  cybersecurity, infosec, malware-analysis
Analyst Arsenal
A toolkit for Security Researchers
Stars: โœญ 112 (+86.67%)
Mutual labels:  cybersecurity, infosec, malware-analysis
Crithit
Takes a single wordlist item and tests it one by one over a large collection of websites before moving onto the next. Create signatures to cross-check vulnerabilities over multiple hosts.
Stars: โœญ 182 (+203.33%)
Mutual labels:  infosec, bugbounty, offensive-security
py-scripts-other
A collection of some of my scripts
Stars: โœญ 79 (+31.67%)
Mutual labels:  cybersecurity, infosec, bugbounty
Autosetup
Auto setup is a bash script compatible with Debian based distributions to install and setup necessary programs.
Stars: โœญ 140 (+133.33%)
Mutual labels:  infosec, bugbounty, kali-linux
targets
A collection of over 5.1 million sub-domains and assets belonging to public bug bounty programs, compiled into a repo, for performing bulk operations.
Stars: โœญ 85 (+41.67%)
Mutual labels:  cybersecurity, infosec, bugbounty
Pentesting Bible
Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
Stars: โœญ 8,981 (+14868.33%)
Mutual labels:  malware-analysis, bugbounty, kali-linux
Bigbountyrecon
BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation.
Stars: โœญ 541 (+801.67%)
Mutual labels:  cybersecurity, bugbounty, offensive-security
Badkarma
network reconnaissance toolkit
Stars: โœญ 353 (+488.33%)
Mutual labels:  kali-linux, offensive-security, network-security
Malware Feed
Bringing you the best of the worst files on the Internet.
Stars: โœญ 69 (+15%)
Mutual labels:  cybersecurity, infosec, malware-analysis
Pyiris Backdoor
PyIris-backdoor is a modular, stealthy and flexible remote-access-toolkit written completely in python used to command and control other systems. It is now in the beta stage, possibly perpetually. There are bugs still present in the framework, feel free to contribute or help me out with this project its still under active development >_>
Stars: โœญ 145 (+141.67%)
Mutual labels:  cybersecurity, infosec, kali-linux
conti-pentester-guide-leak
Leaked pentesting manuals given to Conti ransomware crooks
Stars: โœญ 772 (+1186.67%)
Mutual labels:  cybersecurity, infosec, offensive-security

๐Ÿ“š SuperLibrary ๐Ÿ“š

Library of Information Security

โš ๏ธ Notice of disclaimer โš ๏ธ

  • I've uploaded books for anyone who can't afford to purchase them.
  • Please buy a hard copy of a book if you profit from it.
  • I will not be held liable for any misuse of books.

Library link :

Library content ๐Ÿงพ

[ Linux ]
[ Programming ]
โ”Œโ”€โ”€โ”€0 [ Miscellaneous ]
โ”œโ”€โ”€โ”€1 [ Network Security ]
โ”œโ”€โ”€โ”€2 [ Web Security ]
โ”œโ”€โ”€โ”€3 [ Reverse Engineering - Malware Analysis ]
โ”œโ”€โ”€โ”€4 [ Android && IOS ]
โ”œโ”€โ”€โ”€4 [ Offensive-Security ]
โ”œโ”€โ”€โ”€5 [ Cisco ]
โ”œโ”€โ”€โ”€7 [ Microsoft ]
โ”œโ”€โ”€โ”€8 [ EC-Council ]
โ”œโ”€โ”€โ”€9 [ SANS ]
โ”œโ”€โ”€โ”€10 [ (ISC)ยฒ ]
โ”œโ”€โ”€โ”€11 [ CompTIA ]
โ”œโ”€โ”€โ”€12 [ Hacker's Handbook Series ]
โ”œโ”€โ”€โ”€13 [ Tribe of Hackers ]
โ”œโ”€โ”€โ”€14 [ Social Engineering ]
โ”œโ”€โ”€โ”€15 [ TOR ]
โ”œโ”€โ”€โ”€16 [ Physical Penetration Testing ]
โ”œโ”€โ”€โ”€17 [ Cheat-Sheets ]
โ”œโ”€โ”€โ”€18 [ IT Books ]
โ””โ”€โ”€โ”€19 [ Arabic ]
defcon torrent.zip
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].