All Projects → CyberQueens → Similar Projects or Alternatives

646 Open source projects that are alternatives of or similar to CyberQueens

Writeups
This repository contains writeups for various CTFs I've participated in (Including Hack The Box).
Stars: ✭ 61 (+103.33%)
Mutual labels:  cybersecurity, vulnerabilities, cyber
Patrowlhears
PatrowlHears - Vulnerability Intelligence Center / Exploits
Stars: ✭ 89 (+196.67%)
Mutual labels:  cybersecurity, vulnerabilities
CyberPunkNetrunner
Cyberpunk 2077 Netrunner Hacking Tool (Easy to use and install). Don't use it on illegal and malicious activity. Inspired by the game CyberPunk 2077 https://www.cyberpunk.net/
Stars: ✭ 69 (+130%)
Mutual labels:  cyber, hacker
Javascript Exercises
📚 Collection of JavaScript exercises and coding challenges.
Stars: ✭ 385 (+1183.33%)
Mutual labels:  exercise, exercises
Hacking
hacker, ready for more of our story ! 🚀
Stars: ✭ 413 (+1276.67%)
Mutual labels:  vulnerabilities, hacker
Learngo
1000+ Hand-Crafted Go Examples, Exercises, and Quizzes
Stars: ✭ 11,847 (+39390%)
Mutual labels:  exercise, exercises
CTF-Write-UP
澳門網絡安全暨奪旗競賽協會(Macau Cyber Security and Capture The Flag Association)MOCSCTF/MOCTF
Stars: ✭ 27 (-10%)
Mutual labels:  cybersecurity, cyber
Reverse Engineering Tutorial
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Stars: ✭ 5,763 (+19110%)
Mutual labels:  cybersecurity, cyber
OpenVAS-Docker
A Docker Image For the Open Vulnerability Assessment Scanner (OpenVAS)
Stars: ✭ 16 (-46.67%)
Mutual labels:  cybersecurity, vulnerabilities
xsim
eXercise Sheets IMproved
Stars: ✭ 57 (+90%)
Mutual labels:  exercise, exercises
Dawnscanner
Dawn is a static analysis security scanner for ruby written web applications. It supports Sinatra, Padrino and Ruby on Rails frameworks.
Stars: ✭ 642 (+2040%)
Mutual labels:  cybersecurity, vulnerabilities
Opencti
Authors
Stars: ✭ 2,165 (+7116.67%)
Mutual labels:  cybersecurity, cyber
Awesome Nodejs Security
Awesome Node.js Security resources
Stars: ✭ 1,294 (+4213.33%)
Mutual labels:  cybersecurity, vulnerabilities
rawsec-cybersecurity-inventory
An inventory of tools and resources about CyberSecurity that aims to help people to find everything related to CyberSecurity.
Stars: ✭ 153 (+410%)
Mutual labels:  cybersecurity, cyber
Hack Tools
The all-in-one Red Team extension for Web Pentester 🛠
Stars: ✭ 2,750 (+9066.67%)
Mutual labels:  cybersecurity, hacker
Hacker ezines
A collection of electronic hacker magazines carefully curated over the years from multiple sources
Stars: ✭ 72 (+140%)
Mutual labels:  vulnerabilities, hacker
firecracker
Stop half-done API specifications! Cherrybomb is a CLI tool that helps you avoid undefined user behaviour by validating your API specifications.
Stars: ✭ 438 (+1360%)
Mutual labels:  cybersecurity, cyber
H4cker
This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Stars: ✭ 10,451 (+34736.67%)
Mutual labels:  cybersecurity, hacker
Osint San
Framework для сбора данных из открытых источников. В Framework используется большое количество API, их необходимо зарегистрировать самому.​
Stars: ✭ 99 (+230%)
Mutual labels:  cybersecurity, hacker
Python Beginner Programming Exercises
Practice your Python programming skills with this interactive and auto-graded set of exercises.
Stars: ✭ 47 (+56.67%)
Mutual labels:  exercise, exercises
haiti
🔑 Hash type identifier (CLI & lib)
Stars: ✭ 287 (+856.67%)
Mutual labels:  cybersecurity, cyber
Zeek-Network-Security-Monitor
A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the necessary hardware and setup and finally provide some examples of how you can use the power of Zeek to have absolute control over your network.
Stars: ✭ 38 (+26.67%)
Mutual labels:  cybersecurity, cyber
phomber
Phomber is infomation grathering tool that reverse search phone numbers and get their details, written in python3.
Stars: ✭ 59 (+96.67%)
Mutual labels:  cybersecurity, hacker
Cvebase.com
cvebase is a community-driven vulnerability data platform to discover the world's top security researchers and their latest disclosed vulnerabilities & PoCs
Stars: ✭ 88 (+193.33%)
Mutual labels:  cybersecurity, vulnerabilities
Vuls
Agent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices
Stars: ✭ 8,844 (+29380%)
Mutual labels:  cybersecurity, vulnerabilities
Hackercamp
Enine boyuna siber güvenlik
Stars: ✭ 149 (+396.67%)
Mutual labels:  cybersecurity, hacker
docker-advance-training-exercise
Materials for Docker Advanced training
Stars: ✭ 14 (-53.33%)
Mutual labels:  exercise, exercises
yavdb
Yet Another Vulnerability Database
Stars: ✭ 14 (-53.33%)
Mutual labels:  vulnerabilities
inthewilddb
Hourly updated database of exploit and exploitation reports
Stars: ✭ 127 (+323.33%)
Mutual labels:  vulnerabilities
reosploit
A Tool that Finds, Enumerates, and Exploits Reolink Cameras.
Stars: ✭ 89 (+196.67%)
Mutual labels:  cybersecurity
ICS-Security-Products
Lists of products useful for ICS security
Stars: ✭ 78 (+160%)
Mutual labels:  cybersecurity
Abused-Legitimate-Services
Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups
Stars: ✭ 42 (+40%)
Mutual labels:  cybersecurity
ehtk
Ethical Hacking Toolkit is a collection of tools, cheat sheets, and resources for Ethical hackers, Penetration Tester, and Security Researchers etc. It contains almost all tools mentioned in CEH, OSCP, eCPPT and PNPT
Stars: ✭ 59 (+96.67%)
Mutual labels:  cybersecurity
py-scripts-other
A collection of some of my scripts
Stars: ✭ 79 (+163.33%)
Mutual labels:  cybersecurity
Awesome-CyberSec-Resources
An awesome collection of curated Cyber Security resources(Books, Tutorials, Blogs, Podcasts, ...)
Stars: ✭ 273 (+810%)
Mutual labels:  cybersecurity
conti-pentester-guide-leak
Leaked pentesting manuals given to Conti ransomware crooks
Stars: ✭ 772 (+2473.33%)
Mutual labels:  cybersecurity
Wtfiswronghere
A collection of simple errors that beginners are likely to hit when they start writing Python.
Stars: ✭ 240 (+700%)
Mutual labels:  exercise
Learn Python The Hard Way
My answer for the book Learn Python The Hard Way
Stars: ✭ 224 (+646.67%)
Mutual labels:  exercise
Satana-Android-Debug-Bridge
Удаленное подключение к android устройству, по средствам adb подключений.
Stars: ✭ 27 (-10%)
Mutual labels:  hacker
Owlyshield
Owlyshield is an EDR framework designed to safeguard vulnerable applications from potential exploitation (C&C, exfiltration and impact))..
Stars: ✭ 281 (+836.67%)
Mutual labels:  cybersecurity
Labtainers
Labtainers: A Docker-based cyber lab framework
Stars: ✭ 226 (+653.33%)
Mutual labels:  cybersecurity
Sedgewick Algorithms In C Exercises And Examples
Examples and exercises from Algorithms in C, Parts 1-4: Fundamentals, Data Structures, Sorting, Searching by Robert Sedgewick book
Stars: ✭ 222 (+640%)
Mutual labels:  exercise
Creative Scala
Quick, graphical, fun introduction to programming in Scala.
Stars: ✭ 171 (+470%)
Mutual labels:  exercise
phisherprice
All In One Pentesting Tool For Recon & Auditing , Phone Number Lookup , Header , SSH Scan , SSL/TLS Scan & Much More.
Stars: ✭ 38 (+26.67%)
Mutual labels:  cybersecurity
React Tutorial Exercises
Learn and practice React.js in this interactive tutorial with dozens of react exercises.
Stars: ✭ 161 (+436.67%)
Mutual labels:  exercise
Inginious
INGInious is a secure and automated exercises assessment platform using your own tests, also providing a pluggable interface with your existing LMS.
Stars: ✭ 138 (+360%)
Mutual labels:  exercise
theia-workshop
Theia Workshop - Building Cloud and Desktop IDEs
Stars: ✭ 38 (+26.67%)
Mutual labels:  exercise
RxKata
Learn Rx through Katas and exercises
Stars: ✭ 19 (-36.67%)
Mutual labels:  exercise
C Solutions
My Solutions to K. N. King's "C Programming: A Modern Approach", second edition
Stars: ✭ 126 (+320%)
Mutual labels:  exercise
K And R Exercises And Examples
All Examples and Exercises from K&R The C Programming Language 2nd edition book
Stars: ✭ 111 (+270%)
Mutual labels:  exercise
CloudFrontier
Monitor the internet attack surface of various public cloud environments. Currently supports AWS, GCP, Azure, DigitalOcean and Oracle Cloud.
Stars: ✭ 102 (+240%)
Mutual labels:  cybersecurity
Exermote
Using Machine Learning to predict the type of exercise from movement data
Stars: ✭ 108 (+260%)
Mutual labels:  exercise
lunasec
LunaSec - Dependency Security Scanner that automatically notifies you about vulnerabilities like Log4Shell or node-ipc in your Pull Requests and Builds. Protect yourself in 30 seconds with the LunaTrace GitHub App: https://github.com/marketplace/lunatrace-by-lunasec/
Stars: ✭ 1,261 (+4103.33%)
Mutual labels:  cybersecurity
snyk-maven-plugin
Test and monitor your projects for vulnerabilities with Maven. This plugin is officially maintained by Snyk.
Stars: ✭ 64 (+113.33%)
Mutual labels:  vulnerabilities
super-hacker
SuperHacker is the ultimate utility to make you look like a hacker.
Stars: ✭ 50 (+66.67%)
Mutual labels:  hacker
cwe-tool
A command line CWE discovery tool based on OWASP / CAPSEC database of Common Weakness Enumeration.
Stars: ✭ 40 (+33.33%)
Mutual labels:  vulnerabilities
Mlkatas
A series of self-correcting challenges for practicing your Machine Learning and Deep Learning skills
Stars: ✭ 58 (+93.33%)
Mutual labels:  exercise
IR-exercises
Solutions of the various test exams of the Information Retrieval course
Stars: ✭ 28 (-6.67%)
Mutual labels:  exercises
Python Exercises
🤓 Series of exercises to learn Python
Stars: ✭ 54 (+80%)
Mutual labels:  exercise
Stanford dbclass
Collection of my solutions to the (infamous) dbclass (2014 version) offered by Stanford.
Stars: ✭ 35 (+16.67%)
Mutual labels:  exercise
1-60 of 646 similar projects