An auto-updating list of shodan dorks with info on the amount of results they return!
-
Updated
Jun 12, 2024
Cybersecurity involves protecting systems, networks, and data from cyber threats. This field encompasses a wide range of practices and technologies designed to safeguard information from unauthorized access, attacks, damage, or theft. Cybersecurity includes preventive measures such as firewalls, encryption, and secure coding practices, as well as detection and response strategies like intrusion detection systems and incident response plans. This topic covers the principles, best practices, and latest trends in cybersecurity, including emerging threats and the evolving landscape of cyber defense.
An auto-updating list of shodan dorks with info on the amount of results they return!
This repository is dedicated to showcasing a collection of educational videos curated with gratitude for Defronix and my mentor Mr. Nitesh Singh. The content available here features a series of insightful tutorials and discussions on various topics related to cybersecurity.
🤖 Bot to get the last Cyber Security information in a Microsoft Teams channel 🏴☠️
IOCs that appear in this repository are meant to be long-lasting indicators of compromise.
Repository intended to allow users to leverage site fingerprints within their environments for threat detection and threat hunting
This repository by Sequoia Heights MS offers an integrated solution featuring a probe and client. Our blocklists, sourced from our honeypot network, are freely available. We provide a sync client for up-to-date protection and a probe tool for contributing new data.
Building a consolidated RSS feed for articles about cyberattacks
Ransomware groups posts
Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
WatchTower - A platform to save your valuable time while staying updated in the Cyber realm.
資安解壓縮的家 Website of Infosec Decompress
List of phishing_scam_domains
List of malware and other malicious artifacts sha256 hashes
List of malware and other malicious artifacts md5 hashes
Lists of addresses of the most active C2, Botnets, Zombies, Scanners in European Cyber Space
Config files for my GitHub profile.
Call for papers / accepted papers in top computer security and deep learning fields.
Asset files for my portfolio webpage. You can visit my portfolio to know more about me, link given below
Created by The cybersecurity community