Claudio-C / awesome-data-sanitizationLinks
Awesome Data Sanitization
☆12Updated 4 years ago
Alternatives and similar repositories for awesome-data-sanitization
Users that are interested in awesome-data-sanitization are comparing it to the libraries listed below
Sorting:
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆64Updated 4 years ago
- Deploy an "illegal" SOC to manage vulnerabilities on your city servers in minutes.☆20Updated 3 years ago
- Visualize networks of phishing by querying the phishstats.info API☆79Updated last year
- Create visualization from Shodan query☆75Updated 4 years ago
- System based on +500 blacklists to detect internet potencialy malicious hosts☆152Updated this week
- Create a VPS on Google Cloud Platform or Digital Ocean easily with Offensive Docker included to launch assessment to the targets.☆81Updated 5 years ago
- Airodump-ng WiFi Scan Visualizer☆61Updated 7 years ago
- Accompanying documentation, images, source code and other stuff from the cybernomad.online blog☆27Updated 5 years ago
- NSE script which leverages the Censys Search API for passive data collection☆58Updated 4 years ago
- Reverse shell auto generator used for Hackthebox/OSCP/Pentest/LABExp☆40Updated 5 years ago
- Reconnaissance and Enumeration automation script☆53Updated 4 years ago
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆148Updated 4 years ago
- Use the Hacker Target IP Tools API for Reconnaissance in Maltego☆66Updated 5 years ago
- Major tools used for Digital Forensic Investigation, includes tools used for Image, Audio, Memory, Network and Disk Image data analysis. …☆87Updated 5 years ago
- This contains a list of Blue Team Tools that I use daily, and have stored here for reference.☆34Updated 8 years ago
- recon-ng modules for Censys☆37Updated 2 years ago
- CHEAT SHEET DE SEGURIDAD PARA ETHICAL HACKING & PENETRATION TESTING☆32Updated 9 years ago
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)☆46Updated 4 years ago
- ☆14Updated 5 years ago
- Open Penetration Testing Bookmarks Collection☆19Updated 10 years ago
- CSI SIEM☆109Updated 3 years ago
- A collection of open source and commercial tools that aid in red team operations.☆11Updated 6 years ago
- Custom security distro for remote penetration testing☆55Updated 4 years ago
- Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection☆28Updated last year
- Curated list of awesome, open source data exfiltration tools☆62Updated 4 years ago
- Orca - Targeted OSINT Framework☆88Updated 2 years ago
- Have you ever faced with the lack of possibility of using NMap? For instance if you have reverse shell as an unprivileged user and there …☆44Updated 2 years ago
- Have you ever faced with the lack of possibility of using NMap? For instance if you have reverse shell as an unprivileged user and there …☆34Updated 2 years ago
- A jupyter notebook that contains the main commands executed during a penetration test☆73Updated 5 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆28Updated 7 years ago