J4FSec / HaccTheHubLinks
Open source self-hosted cyber security learning platform
☆53Updated 2 years ago
Alternatives and similar repositories for HaccTheHub
Users that are interested in HaccTheHub are comparing it to the libraries listed below
Sorting:
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆120Updated last year
- Collaborative pentest tool with highly customizable tools☆75Updated 3 years ago
- Create visualization from Shodan query☆74Updated 4 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆25Updated 3 years ago
- A Firefox add-on for OSINT investigations☆130Updated last month
- Scrape Pastebin API to collect daily pastes, setup a wordlist and be alerted by email when you have a match.☆49Updated 6 months ago
- Create a VPS on Google Cloud Platform or Digital Ocean easily with Offensive Docker included to launch assessment to the targets.☆81Updated 4 years ago
- Script for importing Nmap results into a Neo4j Graph Database☆23Updated 3 months ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆57Updated 5 years ago
- DNSrr is a tool written in bash, used to enumerate all the juicy stuff from DNS.☆121Updated 3 years ago
- ARP Spoofing Defender is a project designed to protect local networks from ARP Spoofing attacks. ARP Spoofing Defender provides mechanism…☆19Updated 9 months ago
- Ideaslocas Repository☆37Updated 4 years ago
- A WLAN red team framework.☆157Updated 10 months ago
- ReconPal: Leveraging NLP for Infosec☆57Updated 3 years ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆34Updated 2 months ago
- Subcert is a subdomain enumeration tool, that finds all the subdomains from certificate transparency logs.☆80Updated 4 years ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆43Updated 3 years ago
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆126Updated last year
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Updated 5 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- URL fingerprinting made easy☆87Updated last year
- Daily alert when a new domain name is registered and contains your keywords☆117Updated last year
- AppsecStudy - open-source elearning management system for information security☆9Updated last year
- OWASP Foundation Web Respository☆36Updated 3 years ago
- Check IP addresses against known cloud provider IP address ranges☆45Updated 2 years ago
- Central IoC scanner based on Loki☆20Updated 3 years ago
- Red Team tools, infrastructure, and hardware weaponized☆106Updated last month
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆30Updated 3 years ago
- Simple 5060 port exploit that calls to a receiver device with pre-setuped phrase☆33Updated 3 years ago
- Shodan Monitoring integration for TheHive.☆131Updated 7 months ago