旨在以攻促防,针对Docker TCP socket的开源利用工具
-
Updated
Aug 27, 2024 - Python
8000
旨在以攻促防,针对Docker TCP socket的开源利用工具
AI-powered cybersecurity chatbot designed to provide helpful and accurate answers to your cybersecurity-related queries and also do code analysis and scan analysis.
Welcome Cybersecurity's World. An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources in Cybersecurity.
Python Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscation techniques.
CyberPunkOS is a virtual machine that incorporates several tools for Open Source Intelligence (OSINT) to dismantle Fake News
DPULSE - Tool for complex approach to domain OSINT
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Penetration Testing in Cybersecurity.
This repository is aimed to contain all basic tools and resources for cybersecurity. In this repository you will get all material which you must know in cybersecurity field.
Comprehensive writeups for all of CyberStart / Cyber FastTrack challenges
A cybersecurity resource library of knowledge documents, links to tools, and automation scripts.
JerseyCTF 2021
CyberSecurity Resources and Tools
Repo containing course materials from our paper, "Pwn Lessons Made Easy With Docker: Towards an Undergraduate Vulnerability Research Cybersecurity Class"
Payload Dropper with Persistance & Privesc & UAC bypass 🐱👤
An academic Cyber Range
A collection of helpful resources related to Cybersecurity and a lot more.
Cyber Security Notes
A basic Intrusion Detection and Prevention System (IDPS) designed to monitor various activities on a host system, detect suspicious behavior, and alert the user to possible threats. The IDPS includes file system, network, and process monitoring, as well as anomaly detection features.
Hands-on lessons for attacking and defending AI systems, starting with the OWASP Top 10 for LLM Applications.
Add a description, image, and links to the cybersecurity-education topic page so that developers can more easily learn about it.
To associate your repository with the cybersecurity-education topic, visit your repo's landing page and select "manage topics."