Creanyx0 / Offensive-Security-Notes---Creanyx0Links
☆26Updated last year
Alternatives and similar repositories for Offensive-Security-Notes---Creanyx0
Users that are interested in Offensive-Security-Notes---Creanyx0 are comparing it to the libraries listed below
Sorting:
- wp-config-scan☆80Updated last year
- A comprehensive automation script for penetration testing and reconnaissance.☆39Updated last year
- OriON is a virtual machine in Spanish that incorporates several tools for Open Source Intelligence (OSINT) on people.☆164Updated 4 months ago
- My notes for the CEH v12 practical exam☆44Updated last year
- Pentesting Reporting Tool☆581Updated 9 months ago
- Personal CheatSheet used for the exam made with Obsidian, download the repo and use the resources within Obsidian for a better experience…☆45Updated 2 years ago
- Extracción de subdominios utilizando el servicio de crt.sh, comprobando los certificados TLS/SSL registrados del dominio.☆16Updated 7 months ago
- Herramienta para escanear y listar dispositivos activos en la red local sin obtener tanta información como en NMAP y sin tener que saber…☆26Updated 11 months ago
- 🥷 SecArchive - Cybersecurity Resource Collection A curated archive of high-quality resources for learning cybersecurity, bug bounty, et…☆205Updated last week
- ☆313Updated last year
- Monta tu laboratorio para preparar la certificación eCPPT☆18Updated 2 years ago
- RansomwareSim is a simulated ransomware☆157Updated last year
- Msfvenom Advanced Obfuscated Payload Builder.☆24Updated 2 months ago
- Herramienta para detectar correos de phishing mediante análisis DKIM, SPF, y WHOIS☆31Updated 11 months ago
- Una colección de mini apps vulnerables desarrolladas en Python con Flask. Cada vulnerabilidad incluye tanto el código vulnerable como su …☆15Updated 2 months ago
- ☆55Updated last year
- Tor Relay Searcher is a Python script that uses the Onionoo TOR API to filter by relay tags.☆9Updated last year
- Househole prioritizes privacy, security, and control, while helping users remain undetected by services that identify temporary emails.☆34Updated 10 months ago
- Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs …☆254Updated 4 months ago
- 🦝 Herramienta de anonimato extremo para Kali Linux. Cambia MAC, VPN, Tor, DNS, Restablece y limpia logs.☆57Updated 3 months ago
- A command-line tool to query the DeHashed API. Easily search for various parameters like usernames, emails, hashed passwords, IP addresse…☆242Updated last month
- From Zero To Hero☆36Updated 3 weeks ago
- Esto es una recopilación de herramientas, laboratorios y contenido utilizado para el curso de OSINT ofrecido por academia-ciberseguridad.…☆16Updated 2 years ago
- These are my customization scripts written in ansible for every time I have to perform a Kali clean install.☆26Updated 3 months ago
- Hands-on cybersecurity projects to enhance skills in phishing investigation, malware analysis, network intrusion detection, and DDoS atta…☆202Updated last year
- Derrick is an advanced data leak scanning and CVE vulnerability analysis tool, designed for cybersecurity researchers and digital defense…☆31Updated 5 months ago
- SOAR Automation with Shuffle, Wazuh & TheHive | This project integrates Shuffle SOAR, Wazuh SIEM, and TheHive to automate security incide…☆106Updated 5 months ago
- Proxmark guide☆18Updated 6 months ago
- OSCP Cheatsheet by Sai Sathvik☆70Updated last year
- Find CVEs associated to Linux and public exploits on github☆119Updated 3 months ago