D00MFist / securityLinks
Notes and Commands for CTFs
☆22Updated 5 years ago
Alternatives and similar repositories for security
Users that are interested in security are comparing it to the libraries listed below
Sorting:
- Central IoC scanner based on Loki☆20Updated 4 years ago
- Custom pentesting tools☆26Updated 5 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆76Updated last year
- Active Directory information dumper via LDAP☆13Updated 5 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆20Updated 2 years ago
- Commands used in Windows penetration tests☆55Updated last week
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Updated 4 years ago
- ☆36Updated 3 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 3 years ago
- Information-Gathering Shell Script☆29Updated 5 years ago
- This is a site I made for easily hosting tools and payload over apache2 on Kali Linux so they are always ready to go. These are a collect…☆17Updated 3 years ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆45Updated 5 years ago
- New Framework Red Team Operations☆19Updated 4 years ago
- A python approach to interacting with web shells.☆30Updated 5 years ago
- Empower your enumeration during OSCP☆36Updated 7 years ago
- Deploy multiple instances of Nessus in docker containers easily☆20Updated 4 years ago
- Scripts and One-Liners☆21Updated last year
- Wireless Pentesting Device☆24Updated 5 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 5 years ago
- ☆24Updated 6 years ago
- Easily-guessable Password Generator for Password Spray Attack☆20Updated 5 years ago
- This script was developed to track progress for reporting (capture screenshot, commands and outputs) during pentest engagement and OSCP.☆74Updated 5 years ago
- Create visualization from Shodan query☆75Updated 4 years ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆58Updated 4 years ago
- Various scripts and codes☆84Updated 4 years ago
- Import Nmap scans to Cherrytree☆36Updated 3 years ago
- Create a VPS on Google Cloud Platform or Digital Ocean easily with Offensive Docker included to launch assessment to the targets.☆81Updated 5 years ago
- web application pentesting tools for docker☆17Updated 3 years ago
- ☆13Updated 3 years ago
- Anonymize your hashcat formatted files for online cracking☆31Updated last year