Hunt down social media accounts by username across social networks
-
Updated
Nov 13, 2024 - Python
Cybersecurity involves protecting systems, networks, and data from cyber threats. This field encompasses a wide range of practices and technologies designed to safeguard information from unauthorized access, attacks, damage, or theft. Cybersecurity includes preventive measures such as firewalls, encryption, and secure coding practices, as well as detection and response strategies like intrusion detection systems and incident response plans. This topic covers the principles, best practices, and latest trends in cybersecurity, including emerging threats and the evolving landscape of cyber defense.
Hunt down social media accounts by username across social networks
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
Web path scanner
Exploitation Framework for Embedded Devices
🔥 Web-application firewalls (WAFs) from security standpoint.
One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
Open Source Vulnerability Management Platform
巡风是一款适用于企业内网的漏洞快速应急,巡航扫描系统。
The Network Execution Tool
Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs and Suricata alerts.
Your Everyday Threat Intelligence
A fully configurable and extendable Bash obfuscation framework. This tool is intended to help both red team and blue team.
📡 A python program to create a fake AP and sniff data.
CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
A default credential scanner.
Created by The cybersecurity community