All Projects → robot_hacking_manual → Similar Projects or Alternatives

1054 Open source projects that are alternatives of or similar to robot_hacking_manual

marcellelee.github.io
No description or website provided.
Stars: ✭ 27 (-84.02%)
Mutual labels:  forensics, cybersecurity, ctf
Memlabs
Educational, CTF-styled labs for individuals interested in Memory Forensics
Stars: ✭ 696 (+311.83%)
Mutual labels:  forensics, cybersecurity, ctf
Reverse Engineering Tutorial
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Stars: ✭ 5,763 (+3310.06%)
Mutual labels:  cybersecurity, cyber-security
Rebel Framework
Advanced and easy to use penetration testing framework 💣🔎
Stars: ✭ 183 (+8.28%)
Mutual labels:  forensics, ctf
penny
3 servos, 10 dollars hexapod
Stars: ✭ 26 (-84.62%)
Mutual labels:  robot, robots
argus
Argus Advanced Remote & Local Keylogger For macOS and Windows
Stars: ✭ 87 (-48.52%)
Mutual labels:  cybersecurity, cyber-security
ReversePowerShell
Functions that can be used to gain Reverse Shells with PowerShell
Stars: ✭ 48 (-71.6%)
Mutual labels:  cybersecurity, cyber-security
Ir Rescue
A Windows Batch script and a Unix Bash script to comprehensively collect host forensic data during incident response.
Stars: ✭ 311 (+84.02%)
Mutual labels:  forensics, cybersecurity
Ctf Tools
Useful CTF Tools
Stars: ✭ 190 (+12.43%)
Mutual labels:  forensics, ctf
toolset
Useful tools for CTF competitions
Stars: ✭ 31 (-81.66%)
Mutual labels:  forensics, ctf
RdpCacheStitcher
RdpCacheStitcher is a tool that supports forensic analysts in reconstructing useful images out of RDP cache bitmaps.
Stars: ✭ 176 (+4.14%)
Mutual labels:  forensics, cybersecurity
urlRecon
📝 urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Server Fingerprint * IP geolocation of the server
Stars: ✭ 31 (-81.66%)
Mutual labels:  forensics, cybersecurity
Lucifer
A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Use Or Build Automation Modules To Speed Up Your Cyber Security Life
Stars: ✭ 302 (+78.7%)
Mutual labels:  cybersecurity, cyber-security
haiti
🔑 Hash type identifier (CLI & lib)
Stars: ✭ 287 (+69.82%)
Mutual labels:  cybersecurity, ctf
Zeek-Network-Security-Monitor
A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the necessary hardware and setup and finally provide some examples of how you can use the power of Zeek to have absolute control over your network.
Stars: ✭ 38 (-77.51%)
Mutual labels:  cybersecurity, cyber-security
cyberops
Cisco Press CCNA Cyber Ops Books and Video Courses supplemental information and additional study materials.
Stars: ✭ 18 (-89.35%)
Mutual labels:  cybersecurity, cyber-security
mini-kali
Docker image for hacking
Stars: ✭ 15 (-91.12%)
Mutual labels:  forensics, ctf
WiFi-Project
Pre-connection attacks, gaining access & post-connection attacks on WEP, WPA & WPA2. 🛰✔️
Stars: ✭ 22 (-86.98%)
Mutual labels:  forensics, cybersecurity
Pentesting toolkit
🏴‍☠️ Tools for pentesting, CTFs & wargames. 🏴‍☠️
Stars: ✭ 1,268 (+650.3%)
Mutual labels:  forensics, ctf
Riceteacatpanda
repo with challenge material for riceteacatpanda (2020)
Stars: ✭ 18 (-89.35%)
Mutual labels:  cybersecurity, ctf
icra20-hand-object-pose
[ICRA 2020] Robust, Occlusion-aware Pose Estimation for Objects Grasped by Adaptive Hands
Stars: ✭ 42 (-75.15%)
Mutual labels:  robot, robots
jerseyctf-2021-challenges
JerseyCTF 2021
Stars: ✭ 22 (-86.98%)
Mutual labels:  cybersecurity, ctf
sixi
Sixi Robot Arm
Stars: ✭ 23 (-86.39%)
Mutual labels:  robot, robots
game-of-thrones-hacking-ctf
Game of Thrones hacking CTF (Capture the flag)
Stars: ✭ 57 (-66.27%)
Mutual labels:  cybersecurity, ctf
nsa-codebreaker-2020
My solutions to the 2020 NSA Codebreaker Challenge
Stars: ✭ 69 (-59.17%)
Mutual labels:  forensics, ctf
ad-privileged-audit
Provides various Windows Server Active Directory (AD) security-focused reports.
Stars: ✭ 42 (-75.15%)
Mutual labels:  forensics, cybersecurity
URL-obfuscator
Python Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscation techniques.
Stars: ✭ 101 (-40.24%)
Mutual labels:  cybersecurity, cyber-security
rawsec-cybersecurity-inventory
An inventory of tools and resources about CyberSecurity that aims to help people to find everything related to CyberSecurity.
Stars: ✭ 153 (-9.47%)
Mutual labels:  cybersecurity, cyber-security
tryhackme-ctf
TryHackMe CTFs writeups, notes, drafts, scrabbles, files and solutions.
Stars: ✭ 140 (-17.16%)
Mutual labels:  cybersecurity, cyber-security
community-projects
Webots projects (PROTO files, controllers, simulation worlds, etc.) contributed by the community.
Stars: ✭ 20 (-88.17%)
Mutual labels:  robot, robots
emanual
Welcome to the ROBOTIS e-Manual ! The e-Manual page rendered from this repository is available for everyone. Just simply click the provided link below :)
Stars: ✭ 105 (-37.87%)
Mutual labels:  robot, manual
Sherlock
This script is designed to help expedite a web application assessment by automating some of the assessment steps (e.g., running nmap, sublist3r, metasploit, etc.)
Stars: ✭ 36 (-78.7%)
Mutual labels:  cybersecurity, cyber-security
CTF-Write-UP
澳門網絡安全暨奪旗競賽協會(Macau Cyber Security and Capture The Flag Association)MOCSCTF/MOCTF
Stars: ✭ 27 (-84.02%)
Mutual labels:  cybersecurity, ctf
OpenVAS-Docker
A Docker Image For the Open Vulnerability Assessment Scanner (OpenVAS)
Stars: ✭ 16 (-90.53%)
Mutual labels:  cybersecurity, cyber-security
CTF-Script-And-Template-Thrift-Shop
[180+ scripts] There are a few genuine gems in there. And a lot of spaghetti code. Most of these scripts were for solving CTF's. If you googles something for a CTF and landed here look at the scripts they're all fairly malleable. Sorry for the shitty naming conventions (not really). If you are a recruiter stop. I wont be able to rewrite half thi…
Stars: ✭ 38 (-77.51%)
Mutual labels:  forensics, ctf
Picoctf
The platform used to run picoCTF. A great framework to host any CTF.
Stars: ✭ 203 (+20.12%)
Mutual labels:  cybersecurity, ctf
Free Security Ebooks
Free Security and Hacking eBooks
Stars: ✭ 3,132 (+1753.25%)
Mutual labels:  forensics, cyber-security
Oscp Pentest Methodologies
备考 OSCP 的各种干货资料/渗透测试干货资料
Stars: ✭ 166 (-1.78%)
Mutual labels:  cybersecurity, ctf
Dfw1n Osint
Australian Open Source Intelligence Gathering Resources, Australias Largest Open Source Intelligence Repository for Cyber Professionals and Ethical Hackers
Stars: ✭ 63 (-62.72%)
Mutual labels:  forensics, cybersecurity
Pcapxray
❄️ PcapXray - A Network Forensics Tool - To visualize a Packet Capture offline as a Network Diagram including device identification, highlight important communication and file extraction
Stars: ✭ 1,096 (+548.52%)
Mutual labels:  forensics, cybersecurity
NIST-to-Tech
An open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)
Stars: ✭ 61 (-63.91%)
Mutual labels:  cybersecurity, cyber-security
EventTranscriptParser
Python based tool to extract forensic info from EventTranscript.db (Windows Diagnostic Data)
Stars: ✭ 22 (-86.98%)
Mutual labels:  forensics, cybersecurity
phisherprice
All In One Pentesting Tool For Recon & Auditing , Phone Number Lookup , Header , SSH Scan , SSL/TLS Scan & Much More.
Stars: ✭ 38 (-77.51%)
Mutual labels:  cybersecurity, cyber-security
awesome-vacuum
A curated list of free and open source software and hardware to build and control a robot vacuum.
Stars: ✭ 187 (+10.65%)
Mutual labels:  robot, robots
cuc-wiki
个人教学 Wiki
Stars: ✭ 83 (-50.89%)
Mutual labels:  cybersecurity, cyber-security
CloudFrontier
Monitor the internet attack surface of various public cloud environments. Currently supports AWS, GCP, Azure, DigitalOcean and Oracle Cloud.
Stars: ✭ 102 (-39.64%)
Mutual labels:  cybersecurity, cyber-security
Rvd
Robot Vulnerability Database. An archive of robot vulnerabilities and bugs.
Stars: ✭ 87 (-48.52%)
Mutual labels:  robot, cybersecurity
who and what to follow
Who and what to follow in the world of cyber security
Stars: ✭ 124 (-26.63%)
Mutual labels:  cybersecurity, cyber-security
Reverse-Engineering
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Stars: ✭ 7,234 (+4180.47%)
Mutual labels:  cybersecurity, cyber-security
echoCTF.RED
A platform to develop, run and administer CTF competitions. The online echoCTF.RED platform user interfaces and codebase
Stars: ✭ 33 (-80.47%)
Mutual labels:  cybersecurity, ctf
smram parse
System Management RAM analysis tool
Stars: ✭ 50 (-70.41%)
Mutual labels:  forensics
sike-java
SIKE for Java is a software library that implements experimental supersingular isogeny cryptographic schemes that aim to provide protection against attackers running a large-scale quantum computer.
Stars: ✭ 28 (-83.43%)
Mutual labels:  cybersecurity
attack-stix-data
STIX data representing MITRE ATT&CK
Stars: ✭ 118 (-30.18%)
Mutual labels:  cybersecurity
SentryPeer
A distributed peer to peer list of bad actor IP addresses and phone numbers collected via a SIP Honeypot.
Stars: ✭ 108 (-36.09%)
Mutual labels:  cybersecurity
BerylEnigma
一个为渗透测试与CTF而制作的工具集,主要实现一些加解密的功能。
Stars: ✭ 329 (+94.67%)
Mutual labels:  ctf
Linux-Kernel-Exploitation
Linux kernel development & exploitation lab.
Stars: ✭ 130 (-23.08%)
Mutual labels:  ctf
ggtfobins
Get GTFOBins info about a given exploit from the command line
Stars: ✭ 27 (-84.02%)
Mutual labels:  ctf
rcj-soccer-sim
The RoboCupJunior Soccer Simulator, based on Webots
Stars: ✭ 16 (-90.53%)
Mutual labels:  robot
GDPatrol
A Lambda-powered Security Orchestration framework for AWS GuardDuty
Stars: ✭ 50 (-70.41%)
Mutual labels:  cybersecurity
hitbsecconf-ctf-2021
HITB SECCONF EDU CTF 2021. Developed with ❤️ by Hackerdom team and HITB.
Stars: ✭ 17 (-89.94%)
Mutual labels:  ctf
1-60 of 1054 similar projects