#速查表 cheatsheets#One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️
#学习与技能提升#A curated list of cybersecurity tools and resources.
#Awesome#Awesome Security lists for SOC/CERT/CTI
针对中国开发者,黑客的开源情报工具:名单,主要使用社交ID追踪,枚举,画像等手段,锁定潜在攻击者
Halberd : Multi-Cloud Agentic Attack Tool
Some Pentesters, Security Researchers, Red Teamers which i learned from them a lot...
Collection of script templates to create infinite UAC prompts forcing a user to run as admin ⚠
#大语言模型#Testing platform for covert data exfiltration techniques where sensitive documents are embedded into vector representations and tunneled out under the guise of legitimate RAG operations — bypassing tr...
WEB-Wordlist-Generator creates related wordlists after scanning your web applications.
A tool that allows you to document and assess any security automation in your SOC
Cyber threat intelligence tool suite.
urlyzer is a URL parsing analysis tool.
This is a repo for cybersecurity analyst collecting artifacts in a incident response case.
This script detects typosquatting domains by generating typo variations of a given domain name, checking if they return a valid HTTP response, and running a WHOIS lookup to determine if the domain is ...
A curated collection of essential resources, tools, and references for Security Operations Center (SOC) analysts.
You can simulate an entire ocean of honeypots with just one database.(你只需要一个数据库就可以模拟一片蜜罐汪洋)
Malware repository and analysis platform
Verified Entity Identity Lock (Expose hidden trust paths in your AWS IAM setup before they become security risks.)
A script that webs scrapes multiple webpages for known vulnerable Windows Drivers, SHA256 hashes all system drivers, looks for matching driver names and SHA256 hashes.