CesarIllustrious / CyberSecurityAuditScriptLinks
Security audit script decreases info gathering from average of 5 minutes, to 20 seconds, and returns everything into a textfile.
☆11Updated last year
Alternatives and similar repositories for CyberSecurityAuditScript
Users that are interested in CyberSecurityAuditScript are comparing it to the libraries listed below
Sorting:
- Ransomware for demonstration☆17Updated 2 years ago
- A tool for Pentesters & BugHunters to collect IPs of company, server, Operating System & many more☆12Updated 2 years ago
- ☆12Updated 4 years ago
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Updated 5 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆29Updated 3 years ago
- Recon-ng modules for basic OSINT.☆11Updated 3 years ago
- List of sources for cybersecurity news☆36Updated 2 years ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated 2 years ago
- Sp00fer blog post -☆26Updated 3 years ago
- Automate email search in HaveIBeenPwned☆12Updated 4 years ago
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆12Updated 5 years ago
- Spider or repeater to find all links.☆13Updated 4 years ago
- SSH brute-force script created for HackTheBox☆17Updated 5 years ago
- Pure Honeypots with an automated bash script☆20Updated 3 years ago
- Staged Payloads from Kali Linux - Part 1,2 of 3☆20Updated 2 years ago
- ShellC0de Generator☆11Updated 4 years ago
- Offensive Security Vault structure for Obsidian☆19Updated 2 years ago
- A python script file to statically and dynamically investigate and analyse binary files for buffer overflow exploits.☆10Updated last year
- Site fast fuzzing with chorme extension.☆25Updated 3 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 7 months ago
- A tool to check for response status codes with ease☆14Updated 2 years ago
- buffer overflow examples☆22Updated 7 years ago
- Log4j-Scanner with Bind-Receipt and custom hostnames☆18Updated 3 years ago
- A redteam tool to obfuscate IPv4 addresses to evade AV or Application Firewalls☆19Updated 5 years ago
- ☆12Updated 3 years ago
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆16Updated 4 years ago
- Python support package to parse IP and host inputs from network based tooling☆12Updated last year
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated last year
- This repository contains all my penetration testing study notes, penetration testing tools, scripts, techniques, tricks and also many scr…☆9Updated 9 months ago
- Payloads and Lists☆23Updated 5 years ago