Creanyx0 / Offensive-Security-Notes---Creanyx0Links
☆27Updated last year
Alternatives and similar repositories for Offensive-Security-Notes---Creanyx0
Users that are interested in Offensive-Security-Notes---Creanyx0 are comparing it to the libraries listed below
Sorting:
- wp-config-scan☆81Updated 2 years ago
- A comprehensive automation script for penetration testing and reconnaissance.☆43Updated last year
- OriON is a virtual machine in Spanish that incorporates several tools for Open Source Intelligence (OSINT) on people.☆170Updated 2 months ago
- Máquina virtual educativa que simula los sistemas usados por una empresa eléctrica: control de consumo, monitoreo industrial y cibersegur…☆45Updated 3 months ago
- Msfvenom Advanced Obfuscated Payload Builder.☆32Updated 7 months ago
- Pentesting Reporting Tool☆594Updated last year
- Herramienta para escanear y listar dispositivos activos en la red local sin obtener tanta información como en NMAP y sin tener que saber…☆29Updated last year
- Este script es una herramienta avanzada diseñada para administrar, crear y personalizar máquinas virtuales en entornos Docker, especialme…☆17Updated 11 months ago
- Herramienta para detectar correos de phishing mediante análisis DKIM, SPF, y WHOIS☆32Updated last year
- This is a cheatsheet of commands and processes to compromise an Active Directory environment. Everything documented in this repository is…☆22Updated 8 months ago
- Personal CheatSheet used for the exam made with Obsidian, download the repo and use the resources within Obsidian for a better experience…☆45Updated 2 years ago
- My notes for the CEH v12 practical exam☆44Updated 2 years ago
- Househole prioritizes privacy, security, and control, while helping users remain undetected by services that identify temporary emails.☆34Updated last year
- Extracción de subdominios utilizando el servicio de crt.sh, comprobando los certificados TLS/SSL registrados del dominio.☆16Updated last year
- These are my customization scripts written in ansible for every time I have to perform a Kali clean install.☆28Updated 9 months ago
- A curated list of essential digital forensics tools used for investigation, data recovery, and security analysis. These tools help in dis…☆97Updated 10 months ago
- A command-line tool to query the DeHashed API. Easily search for various parameters like usernames, emails, hashed passwords, IP addresse…☆256Updated 6 months ago
- SOAR Automation with Shuffle, Wazuh & TheHive | This project integrates Shuffle SOAR, Wazuh SIEM, and TheHive to automate security incide…☆118Updated 11 months ago
- Monta tu laboratorio para preparar la certificación eCPPT☆19Updated 2 years ago
- ☆55Updated last year
- This repository contains study materials, notes, and resources to prepare for the Blue Team Level 1 (BTL1) certification exam.☆87Updated 9 months ago
- From Zero To Hero☆36Updated 6 months ago
- ☆316Updated last year
- An automated NMAP python script☆48Updated 11 months ago
- Cybersecurity Security Operations Center (SOC) Analyst NOW, by EC-Council☆39Updated 2 years ago
- Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs …☆258Updated 9 months ago
- Hands-on cybersecurity projects to enhance skills in phishing investigation, malware analysis, network intrusion detection, and DDoS atta…☆241Updated last year
- Esto es una recopilación de herramientas, laboratorios y contenido utilizado para el curso de OSINT ofrecido por academia-ciberseguridad.…☆16Updated 3 years ago
- Domain_checker application is the trial/demo version for the new EASM (External Attack Surface Management) system called HydrAttack (hydr…☆189Updated last year
- 🦝 Herramienta de anonimato extremo para Kali Linux. Cambia MAC, VPN, Tor, DNS, Restablece y limpia logs.☆58Updated 9 months ago