An open API service providing repository metadata for many open source software ecosystems.

GitHub topics: cybersecurity-research

N4rr34n6/IP2Domain

IP2Domain is an advanced network reconnaissance tool designed for cybersecurity professionals, threat researchers, and system administrators. Its purpose is to enable deep and efficient analysis of large-scale networks, focusing on discovering web servers and analyzing IP addresses while always maintaining user privacy and security.

Language: Python - Size: 28.3 KB - Last synced at: about 1 month ago - Pushed at: about 1 month ago - Stars: 1 - Forks: 1

Elijahhx/Dead1ock-h4ck

"Dead1ock-h4ck" is an open-source project dedicated to exploring cybersecurity and ethical hacking techniques. The project aims to provide resources and tools for learning about network security, cryptography, and penetration testing.

Language: Java - Size: 118 KB - Last synced at: 22 days ago - Pushed at: about 2 months ago - Stars: 7 - Forks: 1

Oliverwebdev/FrameWorm

Ein modulares Malware-Simulationsframework für Bildungs- und Forschungszwecke. Dieses Projekt demonstriert verschiedene Techniken moderner Malware (Netzwerkverbreitung, Persistence, Evasion, C2) in einer sicheren Sandbox-Umgebung ohne tatsächliche schädliche Aktionen. Alle Funktionen werden nur simuliert und protokolliert

Language: Python - Size: 55.7 KB - Last synced at: 2 months ago - Pushed at: 2 months ago - Stars: 1 - Forks: 0

Jajatahai/Dead1ock-h4ck

Vision is a truly unique software for Deadlock, developed using advanced technologies and reverse expertise. We proudly present a reliable solution that will give you an edge over your competitors.

Size: 1000 Bytes - Last synced at: 2 months ago - Pushed at: 2 months ago - Stars: 0 - Forks: 0

khalil-b1/goosint-cyber-news

🕵️‍♂️ A curated list of cybersecurity news and articles sources

Size: 3.91 KB - Last synced at: 3 months ago - Pushed at: 3 months ago - Stars: 0 - Forks: 0

Gon841/Dead1ock-h4ck

Vision is a truly unique software for Deadlock, developed using advanced technologies and reverse expertise. We proudly present a reliable solution that will give you an edge over your competitors.

Size: 1000 Bytes - Last synced at: 3 months ago - Pushed at: 3 months ago - Stars: 0 - Forks: 0

ninhdan/BRUTE-FORCE-CRYPTO-WALLETS-

Size: 1.95 KB - Last synced at: 8 months ago - Pushed at: 8 months ago - Stars: 2 - Forks: 0

AkinRigo/BRUTE-FORCE-CRYPTO-WALLETS-

Size: 1.95 KB - Last synced at: 8 months ago - Pushed at: 8 months ago - Stars: 136 - Forks: 0

thequietlife/thequietlife.io

🖊️ my portfolio

Language: HTML - Size: 12 MB - Last synced at: 9 months ago - Pushed at: 9 months ago - Stars: 0 - Forks: 0

aaryanrlondhe/Malware-Hash-Database

A comprehensive repository of malware hashes for cybersecurity research and analysis. Regularly updated and community-driven. Contributions are welcome to help improve and expand this resource!

Size: 85.6 MB - Last synced at: 11 months ago - Pushed at: 11 months ago - Stars: 1 - Forks: 0

rethyxyz/Jester

A home directory file scrambler

Language: Python - Size: 0 Bytes - Last synced at: almost 2 years ago - Pushed at: almost 2 years ago - Stars: 0 - Forks: 0

garthhumphreys/vulnerability-research-handbook

Collection of Notes on How-to get started in Cybersecurity Vulnerability Research

Size: 989 KB - Last synced at: over 1 year ago - Pushed at: over 1 year ago - Stars: 0 - Forks: 0

Related Keywords
cybersecurity-research 12 cybersecurity 7 ransomware 4 hacking 4 cyber-defense 3 penetration-testing 3 dead1ock-h4ck 3 exploit 3 github 3 vulnerability 3 malware 3 pentesting 3 programming 3 security 3 technology 3 wallet-protection 2 wallet-recovery-tools 2 wallet-security 2 security-auditing 2 secure-wallets 2 password-cracking 2 hacking-techniques 2 encryption-tools 2 data-recovery 2 attack-simulation 2 blockchain-security 2 brute-force-attacks 2 brute-force-methods 2 crypto-hacking-tools 2 crypto-security-audits 2 crypto-wallets 2 cryptography-methods 2 cybersecurity-tools 2 hacktivism 2 vulnerability-research-handbook 1 vulnerability-research 1 software-vulnerabilities 1 handbook 1 cyber-security 1 shredding-files 1 file-scrambler 1 virus-scanning 1 virus-library 1 virus-discovery 1 malware-signature-database 1 malware-sample-hashes 1 malware-research 1 malware-protection 1 malware-hashes 1 malware-hash-repository 1 malware-hash-collection 1 portfolio 1 threatintelligence 1 computer-virus 1 hash-database 1 malware-analysis 1 malware-database 1 malware-dataset 1 malware-detection 1 web-vulnerability-assessment 1 web-server-discovery 1 user-agent-rotation 1 tor-network 1 sqlite-database 1 osint 1 network-scanning 1 network-mapping 1 networdk-administration 1 multi-threaded-scanning 1 ip-range-analysis 1 ip-address-management 1 information-gathering 1 http-https-reconnaissance 1 geolocation-tracking 1 ethical-hacking 1 anonymous-scanning 1 cybersecurity-resources 1 cybersecurity-news 1 cybersecurity-blog 1 cyber-threat-intelligence 1 security-training 1 security-education 1 sandbox-environment 1 ransomware-simulation 1 python3 1 network-security 1 malware-simulation 1 evasion-techniques 1 educational-tools 1 cybersecurity-framework 1 command-and-control 1 botnet-simulation 1 infosec 1