ANSSI-FR / fuzzysullyLinks
☆40Updated 6 months ago
Alternatives and similar repositories for fuzzysully
Users that are interested in fuzzysully are comparing it to the libraries listed below
Sorting:
- French old computer security ezines restored to serve as mirrors. The sources have been slightly tweaked for immediate use.☆70Updated last year
- The IoT Security Testing Guide (ISTG) provides a comprehensive methodology for penetration tests in the IoT field, offering flexibility t…☆112Updated 2 months ago
- ☆23Updated last year
- Dredging up secrets from the depths of the file system☆130Updated 11 months ago
- ☆86Updated this week
- Bluetooth Security Assessment Methodology☆137Updated last year
- Converting your Burp Suite projects into JSON APIs which can be viewed with Swagger editor or imported into Postman.☆70Updated 10 months ago
- ☆41Updated last year
- petit programme marrant☆22Updated last week
- Access All Networks: an offensive multitool against 802.1X☆17Updated last month
- The most complete code auditing platform with thousands of real-world challenges☆131Updated 3 months ago
- External Playbooks for Public Access☆39Updated 8 months ago
- A curated list of VULNERABLE APPS and SYSTEMS which can be used as PENETRATION TESTING PRACTICE LAB.☆42Updated 2 years ago
- A BYOSI (Bring-Your-Own-Script-Interpreter) Rapid Payload Deployment Toolkit☆95Updated last year
- gubble is a tool designed to audit Google Workspace group settings. It analyzes settings such as who can join, view membership, post mess…☆79Updated 4 months ago
- Docker images of the Exegol project☆117Updated last week
- An experimental project exploring the use of Large Language Models (LLMs) to solve HackTheBox machines autonomously.☆123Updated last week
- A comprehensive tool that provides an insightful analysis of Microsoft's monthly security updates.☆189Updated 7 months ago
- Deluder is a tool for intercepting traffic of proxy unaware applications. Currently, Deluder supports OpenSSL, GnuTLS, SChannel, WinSock …☆205Updated last year
- Cheat sheet to detect and remove linux kernel rootkit☆74Updated 10 months ago
- ☆107Updated 3 months ago
- A short graduate course on cybercrime, cyberespionage, and cyberoperations☆81Updated 5 months ago
- A collection of tools that I use in CTF's or for assessments☆102Updated 8 months ago
- Automated vulnerability discovery and annotation☆67Updated last year
- ☆116Updated 2 years ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆50Updated 7 months ago
- ☆55Updated last year
- Interactive simulation of a fictional ransomware group's dashboard☆12Updated last year
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆154Updated 8 months ago
- By using its cutting edge technology (lolnope), you can now have a persistent multi reverse pty handler!☆94Updated 6 months ago