ARBCTF / resourcesLinks
Useful books, links, blogs, etc.
☆14Updated 7 years ago
Alternatives and similar repositories for resources
Users that are interested in resources are comparing it to the libraries listed below
Sorting:
- Ansible scripts to build an attack box☆25Updated 7 years ago
- WebBorer is a directory-enumeration tool written in Go.☆44Updated 2 years ago
- Script to automate, manage, and multithread Nikto scans.☆63Updated 5 years ago
- Data exfiltration PoC scripts☆25Updated 10 years ago
- Miscellaneous analysis tools☆26Updated 10 years ago
- Web Filter External Enumeration Tool (WebFEET)☆77Updated 11 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆55Updated last year
- Next Generation of White Chapel☆21Updated 11 years ago
- A tool to catch spoofed NBNS responses.☆51Updated 7 years ago
- The SSH Multiplex Backdoor Tool☆65Updated 6 years ago
- Phishing Toolkit☆20Updated 7 years ago
- Cross platform (i.e., Windows, Linux, Mac) assessment script. The script helps assess workstations for vulnerabilities and abnormalities.☆19Updated 10 years ago
- We collect many tools used in buffer overflow development in one place, repeating with new idea is not a shame - thanks China :)☆35Updated 12 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Updated 5 years ago
- Search the ExploitDB with a little more control☆22Updated 8 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Updated 12 years ago
- Post-exploitation scripts for OS X persistence and privesc☆73Updated 8 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 4 years ago
- A collection of scripts made duing my personal research☆29Updated 7 years ago
- unix wildcard attacks☆136Updated 7 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- Lootbox downloads open directories shared on Twitter.☆34Updated 4 years ago
- Automatically parses and attacks BloodHound-generated graphs☆42Updated 7 years ago
- Web application that lets you test if your domain is vulnerable to email spoofing☆41Updated 6 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 7 years ago
- Read-only Slack RTM API CLI for monitoring teams☆10Updated 6 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 7 years ago
- List (or plunder) private repos/gists to which a token has access, including those of other users☆11Updated 3 years ago
- Test a network's egress controls with various levels of success and failure.☆105Updated 3 years ago
- DNS Enumeration and Reconnaissance Tool☆36Updated 9 years ago