Hunt down social media accounts by username across social networks
-
Updated
Jul 22, 2024 - Python
Cybersecurity involves protecting systems, networks, and data from cyber threats. This field encompasses a wide range of practices and technologies designed to safeguard information from unauthorized access, attacks, damage, or theft. Cybersecurity includes preventive measures such as firewalls, encryption, and secure coding practices, as well as detection and response strategies like intrusion detection systems and incident response plans. This topic covers the principles, best practices, and latest trends in cybersecurity, including emerging threats and the evolving landscape of cyber defense.
Hunt down social media accounts by username across social networks
An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis.
🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.
This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), artificial intelligence security, vulnerability research, exploit development, reverse engineering, and more.
🔒 A compiled checklist of 300 tips for protecting digital security and privacy in 2024
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
serve as a reverse proxy to protect your websites from attacks and exploits.
Agent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices
A collection of Linux Sysadmin Test Questions and Answers. Test your knowledge and skills in different fields with these Q/A.
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
Attack Surface Management Platform
Berty is a secure peer-to-peer messaging app that works with or without internet access, cellular data or trust in the network
A curated list of tools for incident response
httpx is a fast and multi-purpose HTTP toolkit that allows running multiple probes using the retryablehttp library.
🐸 Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell you what it is! 🧙♀️
This repository contains a 90-day cybersecurity study plan, along with resources and materials for learning various cybersecurity concepts and technologies. The plan is organized into daily tasks, covering topics such as Network , Security , Linux, Python, Traffic Analysis, Git, ELK, AWS, Azure, and Hacking. The repository also includes a `LEARN.md
Tools and Techniques for Red Team / Penetration Testing
Ultimate DevSecOps library
One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
Created by The cybersecurity community