cvA LaTeX template for academic CVs
Stars: ✭ 129 (-60.79%)
CTF-Write-UP澳門網絡安全暨奪旗競賽協會(Macau Cyber Security and Capture The Flag Association)MOCSCTF/MOCTF
Stars: ✭ 27 (-91.79%)
wifi-deautherA fully automatic wifi deauther coded in Python
Stars: ✭ 25 (-92.4%)
curriculumDemocratizing Technical Education 🐮
Stars: ✭ 43 (-86.93%)
phomberPhomber is infomation grathering tool that reverse search phone numbers and get their details, written in python3.
Stars: ✭ 59 (-82.07%)
guia-laboralTips para un buen Curriculum Vitae y filtrar malas pegas
Stars: ✭ 39 (-88.15%)
WebspoiltThis script will you help to find the information about the website and to help in penetrating testing
Stars: ✭ 34 (-89.67%)
Adversary emulation libraryAn open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
Stars: ✭ 295 (-10.33%)
iot-curriculumHands on labs and content for students and educators to learn and teach the Internet of Things at schools, universities, coding clubs, community colleges and bootcamps
Stars: ✭ 110 (-66.57%)
ImpulsiveDLLHijackC# based tool which automates the process of discovering and exploiting DLL Hijacks in target binaries. The Hijacked paths discovered can later be weaponized during Red Team Operations to evade EDR's.
Stars: ✭ 258 (-21.58%)
Behold3r👻Behold3r -- 收集指定网站的子域名,并可监控指定网站的子域名更新情况,发送变更报告至指定邮箱
Stars: ✭ 29 (-91.19%)
Red-Team-EssentialsThis repo will contain some basic pentest/RT commands.
Stars: ✭ 22 (-93.31%)
FakeUSBMake your own BadUSB device!
Stars: ✭ 14 (-95.74%)
EEGEduInteractive Brain Playground - Browser based tutorials on EEG with webbluetooth and muse
Stars: ✭ 91 (-72.34%)
MalsubA Python RESTful API framework for online malware analysis and threat intelligence services.
Stars: ✭ 308 (-6.38%)
goblin一款适用于红蓝对抗中的仿真钓鱼系统
Stars: ✭ 844 (+156.53%)
WiFi-ProjectPre-connection attacks, gaining access & post-connection attacks on WEP, WPA & WPA2. 🛰✔️
Stars: ✭ 22 (-93.31%)
AwesomeMoroccanHackersAn Awesome List of Moroccan Cyber Security Researchers, Pentesters, Bug Hunters.
Stars: ✭ 69 (-79.03%)
Attack ScriptsScripts and a (future) library to improve users' interactions with the ATT&CK content
Stars: ✭ 290 (-11.85%)
attckr⚔️MITRE ATT&CK Machinations in R
Stars: ✭ 22 (-93.31%)
Zeek-Network-Security-MonitorA Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the necessary hardware and setup and finally provide some examples of how you can use the power of Zeek to have absolute control over your network.
Stars: ✭ 38 (-88.45%)
OSPATOpen Source Psychedelic-Assisted Therapy Curriculum
Stars: ✭ 19 (-94.22%)
Kali-Linux-Tools-InterfaceGraphical Web interface developed to facilitate the use of security information tools.
Stars: ✭ 169 (-48.63%)
OpenVAS-DockerA Docker Image For the Open Vulnerability Assessment Scanner (OpenVAS)
Stars: ✭ 16 (-95.14%)
web-development-101Практическое введение во все инструменты, необходимые для создания рабочих веб-сайтов.
Stars: ✭ 21 (-93.62%)
domfindA Python DNS crawler to find identical domain names under different TLDs.
Stars: ✭ 22 (-93.31%)
Open-source-tools-for-CTIPublic Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers
Stars: ✭ 91 (-72.34%)
RecoverPy🙈 Interactively find and recover deleted or 👉 overwritten 👈 files from your terminal
Stars: ✭ 189 (-42.55%)
Ir RescueA Windows Batch script and a Unix Bash script to comprehensively collect host forensic data during incident response.
Stars: ✭ 311 (-5.47%)
idsaThis is the main repository of International Data Spaces Association on GitHub, where you can find general overview and required information on IDS Open Source Landscape.
Stars: ✭ 22 (-93.31%)
WriteupsThis repository contains writeups for various CTFs I've participated in (Including Hack The Box).
Stars: ✭ 61 (-81.46%)
CcatCloud Container Attack Tool (CCAT) is a tool for testing security of container environments.
Stars: ✭ 300 (-8.81%)
security-guidanceSecurity guidance from the MOJ Digital & Technology Cybersecurity team
Stars: ✭ 14 (-95.74%)
ReversePowerShellFunctions that can be used to gain Reverse Shells with PowerShell
Stars: ✭ 48 (-85.41%)
rstthreatsAggregated Indicators of Compromise collected and cross-verified from multiple open and community-supported sources, enriched and ranked using our intelligence platform for you. Threat Intelligence, Threat feed, Open source feed.
Stars: ✭ 17 (-94.83%)
NmapguiAdvanced Graphical User Interface for NMap
Stars: ✭ 318 (-3.34%)
curriculumA curated guide for beginners to start their learning journey. Join the community to learn and grow!
Stars: ✭ 38 (-88.45%)
aeacus🔐 Vulnerability remediation scoring system
Stars: ✭ 52 (-84.19%)
dorothyDorothy is a tool to test security monitoring and detection for Okta environments
Stars: ✭ 85 (-74.16%)
ChepyChepy is a python lib/cli equivalent of the awesome CyberChef tool.
Stars: ✭ 295 (-10.33%)
pyc2bytecodeA Python Bytecode Disassembler helping reverse engineers in dissecting Python binaries by disassembling and analyzing the compiled python byte-code(.pyc) files across all python versions (including Python 3.10.*)
Stars: ✭ 70 (-78.72%)
Cyber-SecurityThis repository is used to store answers when resolving ctf challanges, how i came to that answer and the line of thought used to reach it.
Stars: ✭ 42 (-87.23%)
CurriculumThe open curriculum for learning web development
Stars: ✭ 4,240 (+1188.75%)
targetsA collection of over 5.1 million sub-domains and assets belonging to public bug bounty programs, compiled into a repo, for performing bulk operations.
Stars: ✭ 85 (-74.16%)
visual-curriculuma better way to visualize your university credits and disciplines
Stars: ✭ 27 (-91.79%)
SubzySubdomain takeover vulnerability checker
Stars: ✭ 287 (-12.77%)
CTF-WriteupsRepository of my CTF writeups
Stars: ✭ 25 (-92.4%)
Reverse Engineering TutorialA FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Stars: ✭ 5,763 (+1651.67%)
MispMISP (core software) - Open Source Threat Intelligence and Sharing Platform
Stars: ✭ 3,485 (+959.27%)
PhishapiComprehensive Web Based Phishing Suite for Rapid Deployment and Real-Time Alerting!
Stars: ✭ 272 (-17.33%)
SherlockThis script is designed to help expedite a web application assessment by automating some of the assessment steps (e.g., running nmap, sublist3r, metasploit, etc.)
Stars: ✭ 36 (-89.06%)