-
Updated
Nov 28, 2020
#
cyber-security
Here are 340 public repositories matching this topic...
Free Security and Hacking eBooks
security
hacking
forensics
penetration-testing
ebooks
kali-linux
cyber-security
cloud-security
hacking-ebooks
hackers-handbook
-
Updated
Jul 10, 2019
A comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
c
c-plus-plus
arm
hack
assembly
x64
reverse-engineering
malware
hacking
cybersecurity
assembly-language
x86
cyber
assembly-language-programming
cyber-security
arm-assembly
reverse-engineering-tutorial
cyber-threat-intelligence
assembly-x86-64
assembly-arm
-
Updated
Dec 11, 2020 - C++
hacking
cybersecurity
penetration-testing
francais
pentesting
france
cyber-security
pentest-environment
hacking-tool
pentest-scripts
pentesters
pentest-tool
redteaming
redteam
hacking-tools
pentesting-tools
blueteaming
blackarch-packages
pentesting-python
sofianehamlaoui
-
Updated
Oct 1, 2020 - Python
A collection of awesome security hardening guides, tools and other resources
security
best-practices
cybersecurity
infosec
awesome-list
security-hardening
cyber-security
computer-security
blueteam
security-tools
blue-team
linux-hardening
cis-benchmarks
windows-hardening
-
Updated
Nov 23, 2020
Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.
python
hacking
python3
cybersecurity
keylogger
offensive-security
cyber-security
hacking-tool
keylog
keylogger-analysis
python-hacking
python-tools
hacking-tools
hacking-code
keylogging
keylogger-screenshot
hackingtools
keylogs
offensive-scripts
keyloger
-
Updated
Sep 5, 2020 - Python
linux
keyboard
security
hacking
cybersecurity
keymap
keylogger
keyboard-listeners
cyber-security
keyboard-events
linux-keylogger
keylogging
logkeys
-
Updated
Nov 6, 2020 - C++
Penetration Testing notes, resources and scripts
-
Updated
Jan 17, 2019 - Python
Course Repository for University of Cincinnati Malware Analysis Class (CS[567]038)
-
Updated
Aug 9, 2020 - Assembly
A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.
-
Updated
Dec 7, 2020
xml
hacking
cybersecurity
bug-bounty
infosec
bugbounty
information-security
payload
payloads
cyber-security
websecurity
web-application-security
xxe
xxe-injection
websecurity-reference
xxe-payloads
xxe-example
xml-entity
xxe-payload
xxe-payload-list
-
Updated
Jan 6, 2020
Sandia Cyber Omni Tracker (SCOT)
-
Updated
Dec 2, 2020 - Perl
Tool to generate a Linux kernel module for custom rules with Netfilter hooking. (block ports, Hidden mode, functions to protect etc)
-
Updated
May 24, 2019 - C
docker
devops
container
secops
cybersecurity
penetration-testing
infosec
pentesting
pentest
cyber-security
it-security
devsecops
pentest-tool
docker-security
container-hardening
container-security
-
Updated
Sep 19, 2018
A static code analysis for WordPress (and PHP)
-
Updated
Sep 8, 2020 - Python
DNS rebinding toolkit
-
Updated
Jul 30, 2020 - JavaScript
Collection of PowerShell functions a Red Teamer may use to collect data from a machine
enum
cybersecurity
enumeration
ps1
cyber-security
red-team
red-team-engagement
redteaming
redteam
privesc
powershell-functions
red-teamers
powershell-red-team
sid-values
-
Updated
Dec 9, 2020 - PowerShell
A dashboard for a real-time overview of threat intelligence from MISP instances
-
Updated
Apr 27, 2020 - JavaScript
Wireshark Cheat Sheet
github
cheat-sheets
security
gitbook
cheatsheet
cybersecurity
penetration-testing
wireshark
infosec
network-analysis
information-security
cyber-security
cheat-sheet
penetration-test
network-testing
wireshark-cheatsheet
wireshark-cheat-sheet
wireshark-documantion
-
Updated
Nov 23, 2020
GUI based offensive penetration testing tool (Open Source)
python
docker
open-source
dockerfile
security
parser
crawler
gui
tool
cluster
cybersecurity
penetration-testing
sql-injection
offensive
offensive-security
cyber-security
sniffing
offensive-scripts
sql-injections
offensive-penetration-testing
-
Updated
Oct 21, 2020 - Python
Who and what to follow in the world of cyber security
-
Updated
Sep 23, 2020
This repository contains a list of all web sites I come across that are either hacked with or purposefully hosting malware, ransomware, viruses or trojans.
wordpress
website
malware
cybersecurity
ransomware
viruses
wordpress-site
browsers
cyber-security
clickjacking
hacked
porn
wannacry
trojans
petya
technical-support
click-redirecting
click-jacking
-
Updated
Dec 17, 2020 - Shell
Don't let buffer overflows overflow your mind
hacking
penetration-testing
information-security
offensive-security
cyber-security
buffer-overflow
oscp
oscp-journey
oscp-prep
brainpan
brainpan-vm
oscp-guide
-
Updated
Jun 3, 2020 - Python
Schillings SwordPhish empowers organisations and engages its employees to establish the key component of any cyber security strategy: the Human Firewall.
-
Updated
Jan 26, 2018 - C#
MiniCPS: a framework for Cyber-Physical Systems real-time simulation, built on top of mininet
-
Updated
Nov 6, 2020 - Python
A Docker Image For Greenbone Vulnerability Management with OpenVAS
open-source
docker-container
docker-image
cybersecurity
vulnerability
vulnerabilities
scanning
openvas
vulnerability-management
cyber-security
vulnerability-scanners
gvm
vulnerability-scanning
greenbone
greenbone-vulnerability-manager
nvts
-
Updated
Nov 14, 2020 - XSLT
Hacking and Cyber Security Ebooks | For More Visit -
-
Updated
Oct 16, 2019
This tool is design to find admin panel of any website by using custom wordlist or default wordlist easily and allow you to find admin panel trough a proxy server
website
programming
tool
proxy
hacking
python3
cybersecurity
penetration-testing
pentesting
pkg
cyber-security
admin-scanner
webhacking
pentesting-tools
custom-wordlist
-
Updated
Dec 12, 2020 - Python
Get All Registered Wifi Passwords from Target Computer.
python
hack
hacking
wifi
password
python3
cybersecurity
keylogger
python-3
wifi-network
cyber-security
hacking-tool
wifi-password
keylog
keylogger-analysis
python-hacking
python-tools
hacking-tools
keylogging
keyloger
-
Updated
Mar 27, 2020 - Python
A list to discover work of red team tooling and methodology for penetration testing and security assessment
-
Updated
Mar 8, 2019
Improve this page
Add a description, image, and links to the cyber-security topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the cyber-security topic, visit your repo's landing page and select "manage topics."