All Projects → cuc-wiki → Similar Projects or Alternatives

347 Open source projects that are alternatives of or similar to cuc-wiki

NIST-to-Tech
An open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)
Stars: ✭ 61 (-26.51%)
Mutual labels:  cybersecurity, cyber-security
CloudFrontier
Monitor the internet attack surface of various public cloud environments. Currently supports AWS, GCP, Azure, DigitalOcean and Oracle Cloud.
Stars: ✭ 102 (+22.89%)
Mutual labels:  cybersecurity, cyber-security
Reverse-Engineering
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Stars: ✭ 7,234 (+8615.66%)
Mutual labels:  cybersecurity, cyber-security
Lucifer
A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Use Or Build Automation Modules To Speed Up Your Cyber Security Life
Stars: ✭ 302 (+263.86%)
Mutual labels:  cybersecurity, cyber-security
rawsec-cybersecurity-inventory
An inventory of tools and resources about CyberSecurity that aims to help people to find everything related to CyberSecurity.
Stars: ✭ 153 (+84.34%)
Mutual labels:  cybersecurity, cyber-security
Zeek-Network-Security-Monitor
A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the necessary hardware and setup and finally provide some examples of how you can use the power of Zeek to have absolute control over your network.
Stars: ✭ 38 (-54.22%)
Mutual labels:  cybersecurity, cyber-security
OpenVAS-Docker
A Docker Image For the Open Vulnerability Assessment Scanner (OpenVAS)
Stars: ✭ 16 (-80.72%)
Mutual labels:  cybersecurity, cyber-security
Sherlock
This script is designed to help expedite a web application assessment by automating some of the assessment steps (e.g., running nmap, sublist3r, metasploit, etc.)
Stars: ✭ 36 (-56.63%)
Mutual labels:  cybersecurity, cyber-security
robot hacking manual
Robot Hacking Manual (RHM). From robotics to cybersecurity. Papers, notes and writeups from a journey into robot cybersecurity.
Stars: ✭ 169 (+103.61%)
Mutual labels:  cybersecurity, cyber-security
who and what to follow
Who and what to follow in the world of cyber security
Stars: ✭ 124 (+49.4%)
Mutual labels:  cybersecurity, cyber-security
phisherprice
All In One Pentesting Tool For Recon & Auditing , Phone Number Lookup , Header , SSH Scan , SSL/TLS Scan & Much More.
Stars: ✭ 38 (-54.22%)
Mutual labels:  cybersecurity, cyber-security
tryhackme-ctf
TryHackMe CTFs writeups, notes, drafts, scrabbles, files and solutions.
Stars: ✭ 140 (+68.67%)
Mutual labels:  cybersecurity, cyber-security
cyberops
Cisco Press CCNA Cyber Ops Books and Video Courses supplemental information and additional study materials.
Stars: ✭ 18 (-78.31%)
Mutual labels:  cybersecurity, cyber-security
argus
Argus Advanced Remote & Local Keylogger For macOS and Windows
Stars: ✭ 87 (+4.82%)
Mutual labels:  cybersecurity, cyber-security
URL-obfuscator
Python Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscation techniques.
Stars: ✭ 101 (+21.69%)
Mutual labels:  cybersecurity, cyber-security
ReversePowerShell
Functions that can be used to gain Reverse Shells with PowerShell
Stars: ✭ 48 (-42.17%)
Mutual labels:  cybersecurity, cyber-security
Reverse Engineering Tutorial
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Stars: ✭ 5,763 (+6843.37%)
Mutual labels:  cybersecurity, cyber-security
Lockphish
Lockphish it's the first tool (07/04/2020) for phishing attacks on the lock screen, designed to grab Windows credentials, Android PIN and iPhone Passcode using a https link.
Stars: ✭ 186 (+124.1%)
Mutual labels:  cybersecurity
ICS-Security-Products
Lists of products useful for ICS security
Stars: ✭ 78 (-6.02%)
Mutual labels:  cybersecurity
Fudgec2
FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.
Stars: ✭ 191 (+130.12%)
Mutual labels:  cybersecurity
Whoishere.py
WIFI Client Detection - Identify people by assigning a name to a device performing a wireless probe request.
Stars: ✭ 182 (+119.28%)
Mutual labels:  cybersecurity
Hack Tools
The all-in-one Red Team extension for Web Pentester 🛠
Stars: ✭ 2,750 (+3213.25%)
Mutual labels:  cybersecurity
Awesome-CyberSec-Resources
An awesome collection of curated Cyber Security resources(Books, Tutorials, Blogs, Podcasts, ...)
Stars: ✭ 273 (+228.92%)
Mutual labels:  cybersecurity
Jwtcat
A CPU-based JSON Web Token (JWT) cracker and - to some extent - scanner.
Stars: ✭ 181 (+118.07%)
Mutual labels:  cybersecurity
Advancedmemorychallenges
Advanced buffer overflow and memory corruption security challenges
Stars: ✭ 174 (+109.64%)
Mutual labels:  cybersecurity
Gnuradio
GNU Radio – the Free and Open Software Radio Ecosystem
Stars: ✭ 3,297 (+3872.29%)
Mutual labels:  cybersecurity
Docker Security Images
🔐 Docker Container for Penetration Testing & Security
Stars: ✭ 172 (+107.23%)
Mutual labels:  cybersecurity
Betterbackdoor
A backdoor with a multitude of features.
Stars: ✭ 195 (+134.94%)
Mutual labels:  cybersecurity
reosploit
A Tool that Finds, Enumerates, and Exploits Reolink Cameras.
Stars: ✭ 89 (+7.23%)
Mutual labels:  cybersecurity
Satellite
easy-to-use payload hosting
Stars: ✭ 193 (+132.53%)
Mutual labels:  cybersecurity
Labtainers
Labtainers: A Docker-based cyber lab framework
Stars: ✭ 226 (+172.29%)
Mutual labels:  cybersecurity
Netz
Discover internet-wide misconfigurations while drinking coffee
Stars: ✭ 159 (+91.57%)
Mutual labels:  cybersecurity
py-scripts-other
A collection of some of my scripts
Stars: ✭ 79 (-4.82%)
Mutual labels:  cybersecurity
jerseyctf-2021-challenges
JerseyCTF 2021
Stars: ✭ 22 (-73.49%)
Mutual labels:  cybersecurity
Cypheroth
Automated, extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets.
Stars: ✭ 179 (+115.66%)
Mutual labels:  cybersecurity
Ntlmrecon
Enumerate information from NTLM authentication enabled web endpoints 🔎
Stars: ✭ 252 (+203.61%)
Mutual labels:  cybersecurity
Magicpad
MagicPad is an encryption suite for beginners. It is designed to be run standalone via the browser or executable (Electron).
Stars: ✭ 174 (+109.64%)
Mutual labels:  cybersecurity
Oscp Pentest Methodologies
备考 OSCP 的各种干货资料/渗透测试干货资料
Stars: ✭ 166 (+100%)
Mutual labels:  cybersecurity
Bbrecon
Python library and CLI for the Bug Bounty Recon API
Stars: ✭ 169 (+103.61%)
Mutual labels:  cybersecurity
Payloads
Git All the Payloads! A collection of web attack payloads.
Stars: ✭ 2,862 (+3348.19%)
Mutual labels:  cybersecurity
Owlyshield
Owlyshield is an EDR framework designed to safeguard vulnerable applications from potential exploitation (C&C, exfiltration and impact))..
Stars: ✭ 281 (+238.55%)
Mutual labels:  cybersecurity
Cyberprobe
Capturing, analysing and responding to cyber attacks
Stars: ✭ 162 (+95.18%)
Mutual labels:  cybersecurity
DevSecOps
Ultimate DevSecOps library
Stars: ✭ 4,450 (+5261.45%)
Mutual labels:  cybersecurity
phishEye
phishEye is an ultimate phishing tool in python. Includes popular websites like Facebook, Twitter, Instagram, LinkedIn, GitHub, Dropbox, and many others. Created with Flask, custom templates, and tunneled with ngrok and localhost.run.
Stars: ✭ 47 (-43.37%)
Mutual labels:  cybersecurity
Oblivion
Data leak checker & OSINT Tool
Stars: ✭ 237 (+185.54%)
Mutual labels:  cybersecurity
Python Honeypot
OWASP Honeypot, Automated Deception Framework.
Stars: ✭ 160 (+92.77%)
Mutual labels:  cybersecurity
Slack Watchman
Monitoring your Slack workspaces for sensitive information
Stars: ✭ 159 (+91.57%)
Mutual labels:  cybersecurity
Attack Website
MITRE ATT&CK Website
Stars: ✭ 231 (+178.31%)
Mutual labels:  cybersecurity
Scylla
The Simplistic Information Gathering Engine | Find Advanced Information on a Username, Website, Phone Number, etc.
Stars: ✭ 154 (+85.54%)
Mutual labels:  cybersecurity
Powershell Red Team
Collection of PowerShell functions a Red Teamer may use to collect data from a machine
Stars: ✭ 155 (+86.75%)
Mutual labels:  cybersecurity
conclave
Query compiler for secure multi-party computation.
Stars: ✭ 86 (+3.61%)
Mutual labels:  cybersecurity
Caldera
Automated Adversary Emulation Platform
Stars: ✭ 3,126 (+3666.27%)
Mutual labels:  cybersecurity
Sharp
An anti-ARP-spoofing application software that use active and passive scanning methods to detect and remove any ARP-spoofer from the network.
Stars: ✭ 150 (+80.72%)
Mutual labels:  cybersecurity
Hackercamp
Enine boyuna siber güvenlik
Stars: ✭ 149 (+79.52%)
Mutual labels:  cybersecurity
Osweep
Don't Just Search OSINT. Sweep It.
Stars: ✭ 225 (+171.08%)
Mutual labels:  cybersecurity
Dontclickshit
Як не стати кібер-жертвою
Stars: ✭ 149 (+79.52%)
Mutual labels:  cybersecurity
Pyiris Backdoor
PyIris-backdoor is a modular, stealthy and flexible remote-access-toolkit written completely in python used to command and control other systems. It is now in the beta stage, possibly perpetually. There are bugs still present in the framework, feel free to contribute or help me out with this project its still under active development >_>
Stars: ✭ 145 (+74.7%)
Mutual labels:  cybersecurity
ehtk
Ethical Hacking Toolkit is a collection of tools, cheat sheets, and resources for Ethical hackers, Penetration Tester, and Security Researchers etc. It contains almost all tools mentioned in CEH, OSCP, eCPPT and PNPT
Stars: ✭ 59 (-28.92%)
Mutual labels:  cybersecurity
SSI Extra Materials
In my computer security courses I make extensive usage of cheatsheets for various tools and extra materials to complement the student learning if they are willing to do so. I have decided to share them to enable others to take advantage of them
Stars: ✭ 42 (-49.4%)
Mutual labels:  cybersecurity
Autottp
Automated Tactics Techniques & Procedures
Stars: ✭ 215 (+159.04%)
Mutual labels:  cybersecurity
1-60 of 347 similar projects