DickReverse / InfosecMindmapsLinks
☆41Updated 3 years ago
Alternatives and similar repositories for InfosecMindmaps
Users that are interested in InfosecMindmaps are comparing it to the libraries listed below
Sorting:
- Virtual Security Operations Center☆51Updated 2 years ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆67Updated 4 months ago
- Whalescan is a vulnerability scanner for Windows containers, which performs several benchmark checks, as well as checking for CVEs/vulner…☆155Updated 2 years ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆132Updated 3 years ago
- ☆70Updated 2 years ago
- nse script to inject jndi payloads☆46Updated 3 years ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆95Updated 4 years ago
- Scan your EC2 instance to find its vulnerabilities using Vuls (https://vuls.io/en/)☆89Updated 2 years ago
- Script to export Nessus results to a relational database for use in reports, analysis, or whatever else.☆70Updated 5 months ago
- Robo-Red-Team: Training platform for blue team cybersecurity professionals☆51Updated 4 years ago
- OpenIOC rules to facilitate hunting for indicators of compromise☆37Updated 3 years ago
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆52Updated 3 months ago
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.☆135Updated 5 years ago
- ☆90Updated 3 years ago
- Hayat is a script for report and analyze Google Cloud Platform resources.☆81Updated 5 years ago
- Bento Toolkit is a minimal fedora-based container for penetration tests and CTF with the sweet addition of GUI applications.☆78Updated 4 years ago
- ☆139Updated 2 years ago
- ☆113Updated 2 years ago
- ☆41Updated this week
- InfoSec OpenAI Examples☆19Updated last year
- Reconmap's web client written in React. Manage all your pentest projects from a single place.☆51Updated this week
- IAMFinder enumerates and finds users and IAM roles in a target AWS account.☆111Updated 4 years ago
- Cloud Security Operations Orchestrator☆188Updated last year
- ☆94Updated 3 years ago
- Publicly availalbe vulnarble by desgin vm/machines☆43Updated 3 years ago
- A Docker container for remote penetration testing.☆140Updated 4 years ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆78Updated 3 years ago
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆38Updated 3 years ago
- Volatility MindMap & Cheat Sheet☆29Updated 3 years ago
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆49Updated 2 years ago