-
Updated
Nov 28, 2020
#
cyber-security
Here are 344 public repositories matching this topic...
Free Security and Hacking eBooks
security
hacking
forensics
penetration-testing
ebooks
kali-linux
cyber-security
cloud-security
hacking-ebooks
hackers-handbook
-
Updated
Jul 10, 2019
A comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
c
c-plus-plus
arm
hack
assembly
x64
reverse-engineering
malware
hacking
cybersecurity
assembly-language
x86
cyber
assembly-language-programming
cyber-security
arm-assembly
reverse-engineering-tutorial
cyber-threat-intelligence
assembly-x86-64
assembly-arm
-
Updated
Dec 27, 2020 - C++
hacking
cybersecurity
penetration-testing
francais
pentesting
france
cyber-security
pentest-environment
hacking-tool
pentest-scripts
pentesters
pentest-tool
redteaming
redteam
hacking-tools
pentesting-tools
blueteaming
blackarch-packages
pentesting-python
sofianehamlaoui
-
Updated
Oct 1, 2020 - Python
A collection of awesome security hardening guides, tools and other resources
security
best-practices
cybersecurity
infosec
awesome-list
security-hardening
cyber-security
computer-security
blueteam
security-tools
blue-team
linux-hardening
cis-benchmarks
windows-hardening
-
Updated
Nov 23, 2020
Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.
python
hacking
python3
cybersecurity
keylogger
offensive-security
cyber-security
hacking-tool
keylog
keylogger-analysis
python-hacking
python-tools
hacking-tools
hacking-code
keylogging
keylogger-screenshot
hackingtools
keylogs
offensive-scripts
keyloger
-
Updated
Sep 5, 2020 - Python
linux
keyboard
security
hacking
cybersecurity
keymap
keylogger
keyboard-listeners
cyber-security
keyboard-events
linux-keylogger
keylogging
logkeys
-
Updated
Nov 6, 2020 - C++
Penetration Testing notes, resources and scripts
-
Updated
Jan 17, 2019 - Python
Course Repository for University of Cincinnati Malware Analysis Class (CS[567]038)
-
Updated
Aug 9, 2020 - Assembly
A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.
-
Updated
Dec 7, 2020
xml
hacking
cybersecurity
bug-bounty
infosec
bugbounty
information-security
payload
payloads
cyber-security
websecurity
web-application-security
xxe
xxe-injection
websecurity-reference
xxe-payloads
xxe-example
xml-entity
xxe-payload
xxe-payload-list
-
Updated
Jan 6, 2020
Sandia Cyber Omni Tracker (SCOT)
-
Updated
Dec 2, 2020 - Perl
Tool to generate a Linux kernel module for custom rules with Netfilter hooking. (block ports, Hidden mode, functions to protect etc)
-
Updated
May 24, 2019 - C
docker
devops
container
secops
cybersecurity
penetration-testing
infosec
pentesting
pentest
cyber-security
it-security
devsecops
pentest-tool
docker-security
container-hardening
container-security
-
Updated
Sep 19, 2018
A static code analysis for WordPress (and PHP)
-
Updated
Sep 8, 2020 - Python
DNS rebinding toolkit
-
Updated
Jul 30, 2020 - JavaScript
Collection of PowerShell functions a Red Teamer may use to collect data from a machine
enum
cybersecurity
enumeration
ps1
cyber-security
red-team
red-team-engagement
redteaming
redteam
privesc
powershell-functions
red-teamers
powershell-red-team
sid-values
-
Updated
Dec 9, 2020 - PowerShell
A dashboard for a real-time overview of threat intelligence from MISP instances
-
Updated
Apr 27, 2020 - JavaScript
Wireshark Cheat Sheet
github
cheat-sheets
security
gitbook
cheatsheet
cybersecurity
penetration-testing
wireshark
infosec
network-analysis
information-security
cyber-security
cheat-sheet
penetration-test
network-testing
wireshark-cheatsheet
wireshark-cheat-sheet
wireshark-documantion
-
Updated
Nov 23, 2020
GUI based offensive penetration testing tool (Open Source)
python
docker
open-source
dockerfile
security
parser
crawler
gui
tool
cluster
cybersecurity
penetration-testing
sql-injection
offensive
offensive-security
cyber-security
sniffing
offensive-scripts
sql-injections
offensive-penetration-testing
-
Updated
Oct 21, 2020 - Python
This repository contains a list of all web sites I come across that are either hacked with or purposefully hosting malware, ransomware, viruses or trojans.
wordpress
website
malware
cybersecurity
ransomware
viruses
wordpress-site
browsers
cyber-security
clickjacking
hacked
porn
wannacry
trojans
petya
technical-support
click-redirecting
click-jacking
-
Updated
Dec 26, 2020 - Shell
Who and what to follow in the world of cyber security
-
Updated
Sep 23, 2020
Don't let buffer overflows overflow your mind
hacking
penetration-testing
information-security
offensive-security
cyber-security
buffer-overflow
oscp
oscp-journey
oscp-prep
brainpan
brainpan-vm
oscp-guide
-
Updated
Jun 3, 2020 - Python
Schillings SwordPhish empowers organisations and engages its employees to establish the key component of any cyber security strategy: the Human Firewall.
-
Updated
Jan 26, 2018 - C#
MiniCPS: a framework for Cyber-Physical Systems real-time simulation, built on top of mininet
-
Updated
Nov 6, 2020 - Python
This tool is design to find admin panel of any website by using custom wordlist or default wordlist easily and allow you to find admin panel trough a proxy server
website
programming
tool
proxy
hacking
python3
cybersecurity
penetration-testing
pentesting
pkg
cyber-security
admin-scanner
webhacking
pentesting-tools
custom-wordlist
-
Updated
Dec 20, 2020 - Python
A Docker Image For Greenbone Vulnerability Management with OpenVAS
open-source
docker-container
docker-image
cybersecurity
vulnerability
vulnerabilities
scanning
openvas
vulnerability-management
cyber-security
vulnerability-scanners
gvm
vulnerability-scanning
greenbone
greenbone-vulnerability-manager
nvts
-
Updated
Dec 24, 2020 - XSLT
Hacking and Cyber Security Ebooks | For More Visit -
-
Updated
Oct 16, 2019
Get All Registered Wifi Passwords from Target Computer.
python
hack
hacking
wifi
password
python3
cybersecurity
keylogger
python-3
wifi-network
cyber-security
hacking-tool
wifi-password
keylog
keylogger-analysis
python-hacking
python-tools
hacking-tools
keylogging
keyloger
-
Updated
Mar 27, 2020 - Python
A list to discover work of red team tooling and methodology for penetration testing and security assessment
-
Updated
Mar 8, 2019
Improve this page
Add a description, image, and links to the cyber-security topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the cyber-security topic, visit your repo's landing page and select "manage topics."