☆41Dec 19, 2021Updated 4 years ago
Alternatives and similar repositories for InfosecMindmaps
Users that are interested in InfosecMindmaps are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A set of AWS resources for testing the Log4Shell vulnerability, deployable with terraform☆11Dec 20, 2021Updated 4 years ago
- A simple script that generates an Excel friendly CSV file from an Amass JSON file.☆13May 6, 2022Updated 4 years ago
- Generate a dynamic PAC script that will route traffic to your Burp proxy only if it matches the scope defined in your Burp target.☆33Nov 8, 2021Updated 4 years ago
- Attempt zone transfers on domains☆18Jul 12, 2021Updated 4 years ago
- ☆38Jun 19, 2021Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Deploy an "illegal" SOC to manage vulnerabilities on your city servers in minutes.☆20Dec 8, 2022Updated 3 years ago
- ☆48Feb 21, 2021Updated 5 years ago
- Companion Worm research☆17Nov 8, 2021Updated 4 years ago
- A powerful Windows command-line tool for analyzing and searching ETW (Event Tracing for Windows) provider permissions from the Windows re…☆64Jul 29, 2025Updated 9 months ago
- Simple S3 Bucket Testing Software☆31Nov 4, 2021Updated 4 years ago
- SpecOps is a Burp Suite extension that ingests an OpenAPI or Swagger spec and instantly builds a workbench to test every documented endpo…☆32Mar 27, 2026Updated last month
- Personal Access Token (PAT) recon tool for bug bounty hunters, pentesters & red teams☆42Jul 20, 2025Updated 9 months ago
- ☆16Jul 17, 2024Updated last year
- We borrow the concept of 'personas' from UX/service design and apply it to threat actors to improve understanding between security, techn…☆11Jun 17, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆10Mar 25, 2025Updated last year
- Slides of my public talks☆63Feb 20, 2026Updated 2 months ago
- A BurpSuite plugin for BBRF☆26Nov 17, 2024Updated last year
- CITL's static analysis engine for native code artifacts☆20Apr 29, 2021Updated 5 years ago
- Image Tragick Exploit Tool Using Burp Collaborator☆35May 24, 2024Updated last year
- Motorola 68k architecture support for binary ninja☆12Jun 7, 2022Updated 3 years ago
- Proof on Concept Exploit for CVE-2021-38647 (OMIGOD)☆234Sep 16, 2021Updated 4 years ago
- Simulates a compromise in a cloud and container environment☆34Dec 18, 2024Updated last year
- automated password spraying tool☆148Jun 15, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A DLL that serves OutputDebugString content over a TCP connection☆35Sep 23, 2021Updated 4 years ago
- Yet Another SCA tool☆13Nov 10, 2022Updated 3 years ago
- Small binja plugin to import header file to types☆17Nov 11, 2022Updated 3 years ago
- Simple web app to track OWASP WSTG security testing progress☆28Sep 12, 2025Updated 7 months ago
- Android Push notifications SDK for IBM Cloud Mobile Services☆10Apr 30, 2021Updated 5 years ago
- An interactive, TLS-capable HTTP intercepting proxy designed for penetration testers and software developers, including a parser for the …☆26Jul 31, 2025Updated 9 months ago
- Vulnerability Assessment and Auditing Framework for all the Crypto Implementations.☆37Jun 11, 2016Updated 9 years ago
- A general-purpose, high-interaction honeypot that blends old-school Linux internals with new-school containerization to spawn a new trap …☆27Feb 12, 2020Updated 6 years ago
- Threat Intel and Incident Reponse☆10Aug 29, 2018Updated 7 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Defence Against the Dark Arts☆34Sep 15, 2019Updated 6 years ago
- Let's check if your target is vulnerable for client side prototype pollution.☆65Jan 9, 2024Updated 2 years ago
- My custom kali live build configuration☆10Jan 29, 2021Updated 5 years ago
- ☆15Nov 2, 2022Updated 3 years ago
- A handy plugin for copying requests/responses directly from Burp, some extra magic included.☆13Oct 15, 2021Updated 4 years ago
- ☆30Feb 25, 2025Updated last year
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago