So many people in Information Security create resources for students transitioning into the industry, but the struggle is to share them to Academia. Compiling those and sharing with Academia is the goal of this resource
☆55Jan 24, 2018Updated 8 years ago
Alternatives and similar repositories for Transitioning_Into_InfoSec
Users that are interested in Transitioning_Into_InfoSec are comparing it to the libraries listed below
Sorting:
- ☆23Apr 8, 2015Updated 10 years ago
- An in-development fork of the Riverloopsec Killerbee Project with additional tools / bugfixes☆11Jan 16, 2018Updated 8 years ago
- Ruby Oracle Security Scanner☆16Jul 9, 2012Updated 13 years ago
- Distributed password cracker for operating over high latency networks of loosely coupled hosts.☆13Jul 30, 2013Updated 12 years ago
- NMAP NSE that enumerates VNC authentication types☆17Dec 21, 2010Updated 15 years ago
- Various pentest scripts☆14Mar 17, 2014Updated 11 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- Simple script to automated the capture and merging process when using a hardware TAP☆15Mar 7, 2013Updated 12 years ago
- A Python-Based script designed to output stable and screen-scrapable lists of wireless networks☆15Jun 19, 2014Updated 11 years ago
- phpAudit is a simple shell script that scans PHP files for possible security risks.☆26Apr 7, 2013Updated 12 years ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- Burp plugin that clusters responses to show an overview of received responses☆15Jun 7, 2019Updated 6 years ago
- A new technique to bypass microsoft's applocker.☆12May 27, 2015Updated 10 years ago
- ☆16Oct 23, 2015Updated 10 years ago
- OWASP Findings Format☆19Mar 4, 2021Updated 5 years ago
- MS15-076 Privilege Escalation☆16Aug 11, 2015Updated 10 years ago
- Microsoft Office / COM Object DLL Planting☆15May 14, 2016Updated 9 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆25Apr 30, 2016Updated 9 years ago
- Exfiltration Framework - Exfiltration modeling tool written in Python. Naisho attempts to avoid detection from DLP, IPS/IDS egress filter…☆38Oct 29, 2014Updated 11 years ago
- Python-based SMB Share scanner -- scans a bunch of computers, outputs the path and the file permissions for the account☆44Jun 29, 2017Updated 8 years ago
- Short and simple vulnerable PHP web application that naïve scanners found to be perfectly safe☆14Dec 4, 2015Updated 10 years ago
- Burp plugin to do random fuzzing of HTTP requests☆33Jan 31, 2017Updated 9 years ago
- ☆18Dec 16, 2023Updated 2 years ago
- A dumb script for finding dumb coding errors in WordPress plugins☆53Jun 15, 2022Updated 3 years ago
- Pentesting Tools☆22Sep 15, 2025Updated 5 months ago
- Growing list of potentially dangerous PHP functions☆52May 1, 2019Updated 6 years ago
- Command-line privilege elevation for Windows☆23Nov 27, 2016Updated 9 years ago
- scripts used in my pentest work.☆44Jan 14, 2016Updated 10 years ago
- PowerShell Module Bindings for Capstone/Keystone☆25Nov 15, 2016Updated 9 years ago
- OSX Security Compliance & Hardening☆47Aug 13, 2015Updated 10 years ago
- A Burp Suite extension that checks if a particular URL responds differently to various User-Agent headers☆15Sep 4, 2014Updated 11 years ago
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- Windows Offline Common Password Hash Checker☆29Aug 9, 2016Updated 9 years ago
- ☆63Oct 29, 2012Updated 13 years ago
- Burp Extender to add unique form tokens to scanner requests.☆13Nov 5, 2024Updated last year
- http-dir-enum is a tool for finding content that is not linked on a website. Its main use is for finding directories that exist on a serv…☆15Jun 13, 2021Updated 4 years ago
- Generates Flash based CORS CSRF Proof of Concepts that can be sent directly to clients☆14Jul 3, 2013Updated 12 years ago
- Turn your two-bit doodles into fine artworks with deep neural networks, generate seamless textures from photos, transfer style from one i…☆11May 7, 2016Updated 9 years ago
- Periodically scan target ranges using nmap, ndiff and emailing changes☆11Jan 13, 2017Updated 9 years ago