GoSecure / presentationsLinks
Material from presentations done by GoSecure researchers
☆35Updated last year
Alternatives and similar repositories for presentations
Users that are interested in presentations are comparing it to the libraries listed below
Sorting:
- A compilation of network scanning strategies to find vulnerable devices☆73Updated 2 years ago
- The project is based on Ben Clark's book: Red Team Field Manual.☆57Updated 8 years ago
- A lab to play with authentication and authorisation problems☆96Updated 2 years ago
- This is a set of tips and reminders for pentesting processes and scripts/programs. Initially for personal use, but if anyone else finds t…☆52Updated 5 years ago
- A tool to evaluate Content Security Policies.☆72Updated 5 years ago
- Scripts and tools for AWS Pentest☆53Updated 4 years ago
- Kubernetes Scanner☆40Updated 3 years ago
- Extensive code infrastructure for finding unintended information leaks in files, git repositories and much more.☆28Updated 2 years ago
- DNS File EXfiltration☆46Updated last year
- Bento Toolkit is a minimal fedora-based container for penetration tests and CTF with the sweet addition of GUI applications.☆78Updated 4 years ago
- Deploy a Private Burpsuite Collaborator using boto3 Python Library☆58Updated 5 years ago
- ☆29Updated 8 years ago
- An easy to navigate list of unicode characters that have risky transformations 💥☆26Updated 3 years ago
- Repository for all the workshop content delivered at nullcon X on 1st of March 2019☆81Updated 6 years ago
- This is a Burpsuite plugin built to enable you to import your directory bruteforcing results into burp for easy viewing later. This is an…☆36Updated 2 years ago
- Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.☆101Updated 5 years ago
- Burp Extension for AWS Signing☆89Updated 7 months ago
- AWS Security Checks☆40Updated 7 years ago
- Endpoint for Out-of-Band Exfiltration (DNS & HTTP)☆92Updated 6 years ago
- learning case to prepare OSWE☆37Updated 5 years ago
- A Burp Suite extension for identifying missing Subresource Integrity attributes.☆13Updated 6 years ago
- Asynchronous wordlist based DKIM scanner☆58Updated 4 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆58Updated 5 years ago
- An auxiliary spellcheck dictionary that corresponds with the Bishop Fox Cybersecurity Style Guide☆86Updated 2 years ago
- A static website template for security pages.☆52Updated last month
- JIRA Secure Attachment Looter☆70Updated 5 years ago
- OAuth 2.0 Dynamic Security Scanner☆33Updated 4 years ago
- A multi-processed, multi-threaded scanner to discover web directories on multiple URLs.☆21Updated 5 years ago
- ☆36Updated 5 years ago
- VyAPI - A cloud based vulnerable hybrid Android App☆85Updated 5 years ago