CesarIllustrious / CyberSecurityAuditScriptLinks
Security audit script decreases info gathering from average of 5 minutes, to 20 seconds, and returns everything into a textfile.
☆11Updated last year
Alternatives and similar repositories for CyberSecurityAuditScript
Users that are interested in CyberSecurityAuditScript are comparing it to the libraries listed below
Sorting:
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Updated 3 years ago
- SSH brute-force script created for HackTheBox☆16Updated 5 years ago
- Ransomware for demonstration☆18Updated 2 years ago
- Site fast fuzzing with chorme extension.☆24Updated 3 years ago
- List of sources for cybersecurity news☆41Updated 3 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 5 years ago
- CloudDefense.ai is an automated web application security testing tool that audits your web applications by checking for vulnerabilities l…☆49Updated 2 months ago
- web application pentesting tools for docker☆17Updated 3 years ago
- Offensive Security Vault structure for Obsidian☆24Updated 3 years ago
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆41Updated 3 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆13Updated 5 years ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆35Updated this week
- ☆19Updated 4 years ago
- Notes and Commands for CTFs☆22Updated 5 years ago
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Updated 5 years ago
- This is the official repository for Basic Malware Analysis Course☆20Updated 4 years ago
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆29Updated 3 years ago
- buffer overflow examples☆23Updated 8 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated last year
- Enumeration & fingerprint tool☆24Updated last year
- Spider or repeater to find all links.☆10Updated 4 years ago
- Master of Science in Cybersecurity, Sapienza University of Rome.☆58Updated last year
- URL fingerprinting made easy☆90Updated last year
- Volatility 3 plugins to extract a module as complete as possible☆12Updated 2 years ago
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆14Updated 6 years ago
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆18Updated 3 years ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆24Updated last year
- The program allows to download large data from shodan quickly, simply and avoid errors.☆29Updated 5 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆25Updated 2 weeks ago