CyberSecurityUP / smart-contracts-audit-checklistLinks
☆28Updated last year
Alternatives and similar repositories for smart-contracts-audit-checklist
Users that are interested in smart-contracts-audit-checklist are comparing it to the libraries listed below
Sorting:
- This is an AD pentest tools collection☆59Updated last year
- Challenge Python☆19Updated 2 years ago
- Comprehensive AWS cloud reconnaissance and privilege escalation toolkit written in Python. Features IAM, EC2, S3, Lambda, ECS, Secrets Ma…☆47Updated 5 months ago
- Top 400 passwords as per HaveIBeenPwned☆21Updated last year
- ☆65Updated 2 years ago
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆86Updated 7 months ago
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Support☆34Updated last year
- A collection of tools that I use in CTF's or for assessments☆103Updated 10 months ago
- A simple pentest container equipped with common python pentest tools.☆42Updated 3 weeks ago
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆53Updated 8 months ago
- Cloud subdomains identification tool☆61Updated 7 months ago
- Powershell tools used for Red Team / Pentesting.☆79Updated last year
- The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP syst…☆49Updated 9 months ago
- ☆75Updated 2 months ago
- ☆25Updated 2 years ago
- A cheatsheet of tools and commands that I use to pentest Active Directory.☆53Updated 3 years ago
- ☆35Updated 8 months ago
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Updated 2 years ago
- This repository contains my writeups for the labs in PortSwigger's Web Security Academy platform. Each lab writeup includes the lab's nam…☆102Updated 4 months ago
- ☆78Updated last year
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- ☆91Updated 2 years ago
- ☆41Updated 11 months ago
- ☆54Updated 2 years ago
- Workshop & Talk Slide Decks from HackSpaceCon☆25Updated last year
- ☆133Updated 6 months ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆124Updated last year
- Python tool to compare and analyse Nmap XML files to create a spreadsheet with results. Can also be used to create a markdown report usin…☆24Updated last year
- ☆47Updated 9 months ago
- Modules for my C2 course students to use for their own projects.☆74Updated 2 years ago