Echidna-Pentest / EchidnaLinks
☆66Updated 3 months ago
Alternatives and similar repositories for Echidna
Users that are interested in Echidna are comparing it to the libraries listed below
Sorting:
- ☆240Updated 2 years ago
- Generator of static files(csv, jpeg, png, pdf) for testing file upload. It can generate csv and png files of any number of bytes!☆67Updated 10 months ago
- Yet Another Memory Analyzer for malware detection☆197Updated 8 months ago
- KaliPAKU is a training tool for penetration testing using Kali Linux. It is designed to help security professionals and engineers improve…☆37Updated 2 years ago
- RustyBlue is a rust implementation of DeepblueCLI, a forensics log analyzer for finding evidence of compromise from windows event logs.☆72Updated 3 years ago
- ☆73Updated last year
- OSCP Preparation☆88Updated 2 years ago
- Phishing URL dataset from JPCERT/CC☆195Updated last month
- cheat sheet for penetration testing (Japanese) 🐉☆83Updated 5 years ago
- Simple SQL Injection Lab: Hands-on guide and Docker setup for exploring MySQL and PostgreSQL injection techniques☆31Updated 2 years ago
- This is the LLM integration app that contains the vulnerability; please use it to verify the vulnerability of the LLM integration app.☆69Updated 2 months ago
- An Archive of Ransomware Notes Past and Present Collected by Zscaler ThreatLabz☆392Updated last month
- Integrated Security Testing Environment for Web Applications as Burp Extension.☆63Updated 2 years ago
- Uhuru OS - a Distro focused on enhancement several types of security☆42Updated 2 years ago
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆194Updated 10 months ago
- Just some lists of Malware Configs☆173Updated 11 months ago
- AVTOKYO2023 Talks ~AIチャットボットに対する Prompt Injection と Filter Bypass~☆28Updated 2 years ago
- Nuclei templates for honeypots detection.☆196Updated 2 years ago
- A dynamic cheat sheet for PEN-200, OSCP, and other pentests made with Google Sheets☆78Updated last year
- Hands-on Exercises for "Dangerous attack paths: Modern Development Environment Security - Devices and CI/CD pipelines"☆45Updated 3 years ago
- Free training course offered at Hack Space Con 2023☆138Updated 2 years ago
- コンテナ内から安全にダークウェブをクローリングするための環境☆14Updated 2 years ago
- ☆76Updated 3 years ago
- CWE-1003 日本語訳☆10Updated 2 years ago
- Upload files done during my research.☆167Updated last week
- An open-source self-hosted purple team management web application.☆295Updated last week
- A compact guide to network pivoting for penetration testings / CTF challenges.☆221Updated last year
- Pentesting lab with a Kali Linux instance accessible via ssh & wireguard VPN and with vulnerable instances in a private subnet☆192Updated last year
- Burp Suite Extension useful to verify OAUTHv2 and OpenID security☆192Updated last year
- A tool to recover from ESXiArgs ransomware☆300Updated 2 years ago