A (hopefully) actively maintained activity-based-autosorted list of InfoSec Streamers
-
Updated
Nov 15, 2024 - JavaScript
Cybersecurity involves protecting systems, networks, and data from cyber threats. This field encompasses a wide range of practices and technologies designed to safeguard information from unauthorized access, attacks, damage, or theft. Cybersecurity includes preventive measures such as firewalls, encryption, and secure coding practices, as well as detection and response strategies like intrusion detection systems and incident response plans. This topic covers the principles, best practices, and latest trends in cybersecurity, including emerging threats and the evolving landscape of cyber defense.
A (hopefully) actively maintained activity-based-autosorted list of InfoSec Streamers
Reconmap's web client written in React. Manage all your pentest projects from a single place.
Vulnerability assessment and penetration testing automation and reporting platform for teams.
BSides Orlando
Pentest Report Generator
Hide secrets with invisible characters in plain text securely using passwords 🧙🏻♂️⭐
Pentest Report Generator
TryHackMe documentation site source code
Software Developer portfolio highlighting a passion for innovative solutions and a strong commitment to cybersecurity. Showcasing a blend of advanced programming skills and a dedication to data protection and digital safety.
collectvars collects JavaScript variables, highlights risky ones, and helps you understand code structure, while you casually browse.
A Tool for Domain Flyovers
Sasori is a dynamic web crawler powered by Puppeteer, designed for lightning-fast endpoint discovery.
Blocklist de links encurtados comumente enviado por golpista no discord - proteja-se de phishing/scam (golpes)
a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations on decentralized finance
Report writing and vulnerability management platform.
Open Source Intelligence tool base for searching breached PII (Personally identifiable information) by Username, Email, or IP address.
Created by The cybersecurity community