Training course materials, scripts and notes related to database security audit and penetration testing
☆75Mar 8, 2024Updated 2 years ago
Alternatives and similar repositories for Database-Security-Audit
Users that are interested in Database-Security-Audit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Technical notes, AD pentest methodology, list of tools, scripts and Windows commands that are useful for internal penetration tests and a…☆302Jan 1, 2026Updated 2 months ago
- ☆44Oct 16, 2023Updated 2 years ago
- Training course materials and notes related to SAP security audit and penetration testing☆88Feb 21, 2025Updated last year
- This directory contains random scripts from threat hunting or malware research☆11Feb 15, 2018Updated 8 years ago
- Kali Linux Wireless Penetration Testing Beginner's Guide - Third Edition, published by Packt☆28Jan 18, 2023Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A PowerShell script for performing a build review of a Windows host☆23Mar 11, 2019Updated 7 years ago
- This project provides Base64 encoding and decoding functionality to PowerShell within Constrained Language Mode☆27Jun 25, 2024Updated last year
- Vagrant files to bootstrap VM for CTFs☆11Aug 21, 2016Updated 9 years ago
- Python script which takes internal asset inventory at scale using zmap. Outputs to CSV.☆21Mar 9, 2022Updated 4 years ago
- ☆23Aug 31, 2025Updated 6 months ago
- A Python script to authenticate and test access to Google Cloud Platform (GCP) resources.☆17Jan 31, 2024Updated 2 years ago
- Offensive tool for fileless lateral movement on Windows networks☆26May 7, 2024Updated last year
- Blockchain Security Tools and Techniques - A Deep Dive to Virtual Machines, Vulnerability Assessments, Penetration Testing, Audit Tools e…☆33Jul 24, 2024Updated last year
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆17Jan 31, 2021Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆19Oct 2, 2022Updated 3 years ago
- Parses logs created by Cobalt Strike, Brute Ratel, OC2 and creates an SQLite DB which can be used to create custom reports.☆25Mar 18, 2026Updated last week
- An easy way to convert BloodHound output files into data that can be imported into reporting software like Dradis and Plextrac. Built by …☆19Oct 15, 2020Updated 5 years ago
- Single-Clich-Proxy-Chains☆13Mar 29, 2021Updated 4 years ago
- Modulo's Open Distributed SCAP Infrastructure Collector, or modSIC, makes it easier for security analysts to scan an environment vulnerab…☆15Jun 23, 2017Updated 8 years ago
- 🇻🇳 [VNCERT/CC] Digital Forensics Lab 🇻🇳☆21Dec 26, 2024Updated last year
- This repo includes all necessary libraries and codes for the Ultiamte Home Automation project tutorial☆12Jan 14, 2019Updated 7 years ago
- Alternative password shadowing scheme☆10Feb 22, 2026Updated last month
- Offline Security Client☆12Feb 10, 2026Updated last month
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Active Directory certificate abuse☆43Oct 9, 2022Updated 3 years ago
- ☆11Feb 9, 2023Updated 3 years ago
- ☆16Dec 15, 2021Updated 4 years ago
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆51Jun 21, 2025Updated 9 months ago
- OpenSSHd Security Config Checker☆26Aug 25, 2025Updated 7 months ago
- Exactly what it sounds like, which is something rad☆22Oct 12, 2022Updated 3 years ago
- A collection of my presentation materials.☆17Apr 29, 2024Updated last year
- Dissecting and Defeating Ransomware's Evasion Tactics Defcon 32☆17Aug 9, 2024Updated last year
- Squid and Stunnel assembled as a proxy server☆12Mar 2, 2017Updated 9 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A collection of public-domain lexical resources created by Grady Ward.☆13Mar 17, 2023Updated 3 years ago
- Pull author and committer names and emails from Travis-CI☆11Aug 9, 2020Updated 5 years ago
- 🌌 Real-time threat detection for smart contracts☆10May 16, 2023Updated 2 years ago
- Ducky Script is the payload language of Hak5 gear. Since its introduction with the USB Rubber Ducky in 2010, Ducky Script has grown in ca…☆12Jun 20, 2024Updated last year
- Event Query Router☆12Aug 9, 2019Updated 6 years ago
- Minimalistic Keyboard Driven Browser 🌐🎀☆14May 21, 2025Updated 10 months ago
- AspXVenom automates the process of generating encoded shellcode and embedding it into ASPX webshells, providing a smooth workflow for pen…☆18Mar 19, 2025Updated last year