A9HORA / Mindmaps
This repository contains a graphical representation (Mind maps) of specific topics, so one can utilize it as a handbook for that specific topic.
☆17Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for Mindmaps
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 4 months ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated last year
- A learning and testing environment for web application hacking and pentesting.☆24Updated 3 years ago
- Burp extension used to snip any header from all the requests.☆22Updated last year
- This tool compares the WHOIS information of domains to identify similarities and determine if they likely belong to the same company☆13Updated 11 months ago
- A command-line utility for auditing DNS configuration using Zonemaster API☆28Updated last year
- Enumeration & fingerprint tool☆23Updated 8 months ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated 7 months ago
- Pentesting notes☆17Updated last year
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆11Updated 2 years ago
- C2Matrix Automation☆12Updated last year
- Cheat seet for penetration testing☆12Updated 3 weeks ago
- This tool is useful in case you want to evade the detection based on simple rules when trying to dump the SAM, SYSTEM or SECURITY hives u…☆10Updated 2 years ago
- H&E- Burp Highlighter and Extractor☆18Updated last year
- Monitor your target continuously for new subdomains!☆26Updated last year
- ☆16Updated last year
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆9Updated 8 years ago
- A ZAPROXY Add-on that allows testing of web application vulnerabilities by recording complex multi-step sequences. You can test applica…☆22Updated 3 months ago
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆30Updated last year
- ☆15Updated last year
- Manage attack surface data on Elasticsearch☆20Updated last year
- An Vulnerability detection and Exploitation tool for CVE-2024-7339☆16Updated 3 months ago
- Python Prototype Scripts to Exploit or Discover Network vulnerabilities and misconfiguration.☆18Updated 7 months ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the targets with the s…☆17Updated 3 years ago
- ARP Spoofing Defender is a project designed to protect local networks from ARP Spoofing attacks. ARP Spoofing Defender provides mechanism…☆19Updated last week
- Official repository for the Advanced Software Exploitation (ASE) course☆20Updated 6 years ago
- Smart and efficient tool to automate open redirect detection at scale.☆8Updated 2 years ago
- Simple recon tool automates your recon process☆16Updated last year