conflick0's Stars
jpillora/chisel
A fast TCP/UDP tunnel over HTTP
Orange-Cyberdefense/GOAD
game of active directory
Indrajith-S/CEH-Lab-Notes
Step into my GitHub treasure trove—an immersive collection of comprehensive notes chronicling my Certified Ethical Hacker (CEH) lab escapades. Journey through the intricate art of hacking, traversing from covert reconnaissance to the boundless realms of cloud computing. Prepare to illuminate your path in the captivating cosmos of ethical hacking.
hunterxxx/CEH-v12-Practical
CEH Practical Exam Notes (ilab), Blog and video
DarkLycn1976/CEH-Practical-Notes-and-Tools
My Personal Notes that I used on the Exam as a Cheatsheet
zema1/watchvuln
一个高价值漏洞采集与推送服务 | collect valueable vulnerability and push it
center-for-threat-informed-defense/attack_to_cve
🚨ATTENTION🚨 The CVE mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here as an archive.
dessertlab/cti-to-mitre-with-nlp
Replication package for the paper "Automatic Mapping of Unstructured Cyber Threat Intelligence: An Experimental Study" published at the IEEE International Symposium on Software Reliability Engineering (ISSRE) 2022
joshbressers/cve-analysis
Tools for conducting analysis of CVE data in Elasticsearch
hogehuga/epss-db
Download all epss data, and import database. We can explore the data by SQL querys!
sebyakuya/stride-classifier
A multi-label classifier to categorize text in one of the STRIDE categories
center-for-threat-informed-defense/tram
TRAM is an open-source platform designed to advance research into automating the mapping of cyber threat intelligence reports to MITRE ATT&CK®.
danielmiessler/SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
diego-treitos/linux-smart-enumeration
Linux enumeration tool for pentesting and CTFs with verbosity levels
idank/explainshell
match command-line arguments to their help text
Syslifters/sysreptor
Fully customisable, offensive security reporting solution designed for pentesters, red teamers and other security-related people alike.
mrwadams/stride-gpt
An AI-powered threat modeling tool that leverages OpenAI's GPT models to generate threat models for a given application based on the STRIDE methodology.
swisskyrepo/SSRFmap
Automatic SSRF fuzzer and exploitation tool
opsdisk/pagodo
pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching
EnableSecurity/wafw00f
WAFW00F allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.
santoru/shcheck
A basic tool to check security headers of a website
RustScan/RustScan
🤖 The Modern Port Scanner 🤖
frohoff/ysoserial
A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.
snoopysecurity/awesome-burp-extensions
A curated list of amazingly awesome Burp Extensions
GreyDGL/PentestGPT
A GPT-empowered penetration testing tool
commixproject/commix
Automated All-in-One OS Command Injection Exploitation Tool.
rex978956/unicode-steg
Unicode Steganography with Zero-Width Characters, rewrite according to http://330k.github.io/misc_tools/unicode_steganography.html
DilemmaRabbit/DilemmaRabbit.github.io
sam0629/rent-system
場地出租系統
jivoi/awesome-ml-for-cybersecurity
:octocat: Machine Learning for Cyber Security