Pcapxray❄️ PcapXray - A Network Forensics Tool - To visualize a Packet Capture offline as a Network Diagram including device identification, highlight important communication and file extraction
Stars: ✭ 1,096 (+3959.26%)
robot hacking manualRobot Hacking Manual (RHM). From robotics to cybersecurity. Papers, notes and writeups from a journey into robot cybersecurity.
Stars: ✭ 169 (+525.93%)
MemlabsEducational, CTF-styled labs for individuals interested in Memory Forensics
Stars: ✭ 696 (+2477.78%)
WiFi-ProjectPre-connection attacks, gaining access & post-connection attacks on WEP, WPA & WPA2. 🛰✔️
Stars: ✭ 22 (-18.52%)
haiti🔑 Hash type identifier (CLI & lib)
Stars: ✭ 287 (+962.96%)
mini-kaliDocker image for hacking
Stars: ✭ 15 (-44.44%)
Ir RescueA Windows Batch script and a Unix Bash script to comprehensively collect host forensic data during incident response.
Stars: ✭ 311 (+1051.85%)
PicoctfThe platform used to run picoCTF. A great framework to host any CTF.
Stars: ✭ 203 (+651.85%)
Dfw1n OsintAustralian Open Source Intelligence Gathering Resources, Australias Largest Open Source Intelligence Repository for Cyber Professionals and Ethical Hackers
Stars: ✭ 63 (+133.33%)
EventTranscriptParserPython based tool to extract forensic info from EventTranscript.db (Windows Diagnostic Data)
Stars: ✭ 22 (-18.52%)
toolsetUseful tools for CTF competitions
Stars: ✭ 31 (+14.81%)
Pentesting toolkit🏴☠️ Tools for pentesting, CTFs & wargames. 🏴☠️
Stars: ✭ 1,268 (+4596.3%)
echoCTF.REDA platform to develop, run and administer CTF competitions. The online echoCTF.RED platform user interfaces and codebase
Stars: ✭ 33 (+22.22%)
urlRecon📝 urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Server Fingerprint * IP geolocation of the server
Stars: ✭ 31 (+14.81%)
RdpCacheStitcherRdpCacheStitcher is a tool that supports forensic analysts in reconstructing useful images out of RDP cache bitmaps.
Stars: ✭ 176 (+551.85%)
CTF-Write-UP澳門網絡安全暨奪旗競賽協會(Macau Cyber Security and Capture The Flag Association)MOCSCTF/MOCTF
Stars: ✭ 27 (+0%)
Riceteacatpandarepo with challenge material for riceteacatpanda (2020)
Stars: ✭ 18 (-33.33%)
ad-privileged-auditProvides various Windows Server Active Directory (AD) security-focused reports.
Stars: ✭ 42 (+55.56%)
CTF-Script-And-Template-Thrift-Shop[180+ scripts] There are a few genuine gems in there. And a lot of spaghetti code. Most of these scripts were for solving CTF's. If you googles something for a CTF and landed here look at the scripts they're all fairly malleable. Sorry for the shitty naming conventions (not really). If you are a recruiter stop. I wont be able to rewrite half thi…
Stars: ✭ 38 (+40.74%)
Rebel FrameworkAdvanced and easy to use penetration testing framework 💣🔎
Stars: ✭ 183 (+577.78%)
Ctf ToolsUseful CTF Tools
Stars: ✭ 190 (+603.7%)
xecaPowerShell payload generator
Stars: ✭ 103 (+281.48%)
DevSecOpsUltimate DevSecOps library
Stars: ✭ 4,450 (+16381.48%)
hackerinnenhackerinnen.space is a project to provide encouragement and enhance visibility in different places
Stars: ✭ 22 (-18.52%)
ctf-primerTextbook with chapters for each usual picoCTF challenge category.
Stars: ✭ 20 (-25.93%)
2020pWeCTF 2020+ Source Code & Organizer's Writeup
Stars: ✭ 22 (-18.52%)
ctfrepo for ctf
Stars: ✭ 22 (-18.52%)
DFIR Resources REvil KaseyaResources for DFIR Professionals Responding to the REvil Ransomware Kaseya Supply Chain Attack
Stars: ✭ 172 (+537.04%)
ehtkEthical Hacking Toolkit is a collection of tools, cheat sheets, and resources for Ethical hackers, Penetration Tester, and Security Researchers etc. It contains almost all tools mentioned in CEH, OSCP, eCPPT and PNPT
Stars: ✭ 59 (+118.52%)
cuc-wiki个人教学 Wiki
Stars: ✭ 83 (+207.41%)
PackratLive system forensic collector
Stars: ✭ 16 (-40.74%)
LogESPOpen Source SIEM (Security Information and Event Management system).
Stars: ✭ 162 (+500%)
eth-challenge-basexinetd docker for building ethereum contract challenges
Stars: ✭ 74 (+174.07%)
LabtainersLabtainers: A Docker-based cyber lab framework
Stars: ✭ 226 (+737.04%)
EruditusDiscord CTF helper bot for CyberErudites
Stars: ✭ 34 (+25.93%)
phisherpriceAll In One Pentesting Tool For Recon & Auditing , Phone Number Lookup , Header , SSH Scan , SSL/TLS Scan & Much More.
Stars: ✭ 38 (+40.74%)
CloudFrontierMonitor the internet attack surface of various public cloud environments. Currently supports AWS, GCP, Azure, DigitalOcean and Oracle Cloud.
Stars: ✭ 102 (+277.78%)
PyIrisPyIris is a modular remote access trojan toolkit written in python targeting Windows and Linux systems.
Stars: ✭ 296 (+996.3%)
phishEyephishEye is an ultimate phishing tool in python. Includes popular websites like Facebook, Twitter, Instagram, LinkedIn, GitHub, Dropbox, and many others. Created with Flask, custom templates, and tunneled with ngrok and localhost.run.
Stars: ✭ 47 (+74.07%)
OwlyshieldOwlyshield is an EDR framework designed to safeguard vulnerable applications from potential exploitation (C&C, exfiltration and impact))..
Stars: ✭ 281 (+940.74%)
conclaveQuery compiler for secure multi-party computation.
Stars: ✭ 86 (+218.52%)
Instruction-StompCross-architecture instruction counting for CTF solving
Stars: ✭ 32 (+18.52%)
FSEC-VMBackend logic implementation for Vulnerability Management System
Stars: ✭ 19 (-29.63%)
ghidra2dwarf🐉 Export ghidra decompiled code to dwarf sections inside ELF binary
Stars: ✭ 135 (+400%)
PTEPlatform Test Edition
Stars: ✭ 18 (-33.33%)
SSI Extra MaterialsIn my computer security courses I make extensive usage of cheatsheets for various tools and extra materials to complement the student learning if they are willing to do so. I have decided to share them to enable others to take advantage of them
Stars: ✭ 42 (+55.56%)
CCXDiggerThe CyberCX Digger project is designed to help Australian organisations determine if they have been impacted by certain high profile cyber security incidents. Digger provides threat hunting functionality packaged in a simple-to-use tool, allowing users to detect certain attacker activities; all for free.
Stars: ✭ 45 (+66.67%)
writeUpMy write-up on TryHackMe, HackTheBox, and CTF.
Stars: ✭ 58 (+114.81%)
demuxusbA program and toolset to analyze iDevice USB sessions
Stars: ✭ 25 (-7.41%)
CyberQueensCyberQueens lesson materials - learning resources and exercises for aspiring reverse engineers, exploit developers, and hackers 👩💻👨💻
Stars: ✭ 30 (+11.11%)