Lists (1)
Sort Name ascending (A-Z)
Stars
edoardottt / takeover
Forked from jaikishantulswani/takeoverSub-Domain TakeOver Vulnerability Scanner (edoardottt fork)
This repository provides an ISO 27001:2022 Toolkit, including templates, checklists, and policies to help organizations implement the ISO 27001 Information Security Management System (ISMS).
A curated collection of 32 advanced search engines and platforms designed for cybersecurity professionals, penetration testers, OSINT researchers, and hackers. Use these tools to discover internet-…
CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable reports more consistently and efficiently.
SocialPwned is an OSINT tool that allows to get the emails, from a target, published in social networks such as Instagram, Linkedin and Twitter to find possible credentials leaks in PwnDB or Dehash…
This repository contains a 90-day cybersecurity study plan, along with resources and materials for learning various cybersecurity concepts and technologies. The plan is organized into daily tasks, …
Modern CLI for exploring vulnerability data with powerful search, filtering, and analysis capabilities.
Repositori Template, Boilerplate, dan Referensi terkait implementasi UU PDP di Indonesia
functions to exploit common web application vulnerabilities such as SQL Injection, Cross-Site Scripting (XSS), Server-Side Request Forgery (SSRF), and Path Traversal.
This repository will contain many mindmaps for cyber security technologies, methodologies, courses, and certifications in a tree structure to give brief details about them
This repository will contain many mindmaps for cyber security technologies, methodologies, courses, and certifications in a tree structure to give brief details about them
OSINT cheat sheet, list OSINT tools, dataset, article, book and OSINT tips
Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis.
Small and highly portable detection tests based on MITRE's ATT&CK.
GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]
Accurately Locate Smartphones using Social Engineering
Incident Response - Fast suspicious file finder
Password manager for manage your own account password
A plugin for splitting the scoreboard based on team attributes
Rest API untuk mengumpulkan jokes jokes receh dari Indonesia
A collection of CTF write-ups, pentesting topics, guides and notes. Notes compiled from multiple sources and my own lab research. Topics also support OSCP, Active Directory, CRTE, eJPT and eCPPT.
WhatsApp spy - logs online/offline events from ANYONE in the world