ARBCTF / resourcesLinks
Useful books, links, blogs, etc.
☆14Updated 7 years ago
Alternatives and similar repositories for resources
Users that are interested in resources are comparing it to the libraries listed below
Sorting:
- Miscellaneous analysis tools☆27Updated 10 years ago
- Password Guessing for different Web Portals☆29Updated 6 years ago
- Phishing Toolkit☆20Updated 7 years ago
- WebBorer is a directory-enumeration tool written in Go.☆44Updated 2 years ago
- Data collection scripts for All Your Cloud Are Belong To Us conference talk☆29Updated 6 years ago
- Data exfiltration PoC scripts☆25Updated 9 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Updated 7 years ago
- Screenshot Shenanigans☆26Updated 7 years ago
- Ansible scripts to build an attack box☆23Updated 6 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 8 years ago
- Guesses hash types, picks some sensible dictionaries and rules for hashcat☆99Updated last year
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆54Updated 8 months ago
- Zone transfers for rwhois☆20Updated 6 years ago
- Cowrie Honeypot Obscurer☆17Updated 4 years ago
- SubShell is a python command shell used to control and execute commands through HTTP requests to a webshell. SubShell acts as the interfa…☆74Updated 8 years ago
- Python Remote Administration Tool☆13Updated 8 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Updated 5 years ago
- Extract hashes and plain passwords from Dump Monitor tweet☆43Updated 9 years ago
- The SSH Multiplex Backdoor Tool☆65Updated 5 years ago
- Search the ExploitDB with a little more control☆21Updated 8 years ago
- Useful commands for infosec☆29Updated 2 years ago
- Web Filter External Enumeration Tool (WebFEET)☆77Updated 10 years ago
- A tool to catch spoofed NBNS responses.☆50Updated 7 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 4 years ago
- unix wildcard attacks☆135Updated 7 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 7 years ago
- Next Generation of White Chapel☆21Updated 10 years ago
- Checks for PATH substitution vulnerabilities and logs the commands executed by the vulnerable executables☆49Updated 8 years ago
- A password spraying wordlist generator. Takes breach data as a valid input in order to target password reuse.☆44Updated 6 years ago
- Script to automate, manage, and multithread Nikto scans.☆61Updated 5 years ago