JonmarCorpuz / aEnumLinks
Automatic Enumeration is a command line utility that automatically tries to collect and retrieve various pieces of information from a target machine during red team operations
☆16Updated 6 months ago
Alternatives and similar repositories for aEnum
Users that are interested in aEnum are comparing it to the libraries listed below
Sorting:
- A second brain used to store knowledge acquired through various academic pursuits, certifications, and technical projects.☆26Updated last week
- gRPC Goat is a "Vulnerable by Design" lab created to provide an interactive, hands-on playground for learning and practicing gRPC securit…☆50Updated last month
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆87Updated 6 months ago
- CHOMTE.SH is a powerful shell script designed to automate reconnaissance tasks during penetration testing. It utilizes various Go-based t…☆130Updated 10 months ago
- ☆35Updated 7 months ago
- A simple pentest container equipped with common python pentest tools.☆42Updated 8 months ago
- ☆128Updated 5 months ago
- Notes for OSCP & CPTS.☆41Updated 3 weeks ago
- Dredging up secrets from the depths of the file system☆130Updated last year
- This is an UNOFFICIAL guide and general list of cheatsheets, references, and walkthroughs aligned with the OffSec OSCP exam process☆29Updated 2 years ago
- Challenge Python☆19Updated 2 years ago
- Web app usefullness☆34Updated last month
- My notes while studying for the PNPT from TCM Security.☆81Updated last year
- List of questions, answers and random notes for security interviews☆70Updated 4 years ago
- ☆55Updated last year
- Comprehensive AWS cloud reconnaissance and privilege escalation toolkit written in Python. Features IAM, EC2, S3, Lambda, ECS, Secrets Ma…☆45Updated 4 months ago
- This repository contains my writeups for the labs in PortSwigger's Web Security Academy platform. Each lab writeup includes the lab's nam…☆102Updated 3 months ago
- SAST and DAST Scan Supported with 400 plus rules available for secrets and allow you add your own wordlist as well. lightweight source c…☆103Updated 2 months ago
- A cheatsheet of tools and commands that I use to pentest Active Directory.☆51Updated 3 years ago
- A curated list of cloud pentesting resource, contains AWS, Azure, Google Cloud☆135Updated 3 years ago
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Support☆34Updated last year
- ThreatTracer - A python Script to identify CVE by name & version and more by @FR13ND0x7F☆137Updated 5 months ago
- ☆233Updated last month
- Quick scripts I developed to streamline OSCP tasks☆197Updated 4 months ago
- Resources for Students in the Practical Webapp Security and Testing course☆21Updated 3 weeks ago
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆29Updated last year
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆78Updated last year
- Vagrant provisioning scripts to create a simulated network environment for tabletop exercises☆39Updated 3 years ago
- ☆242Updated 9 months ago
- SubSnipe is a tool designed to help find subdomains that are vulnerable to takeover.☆130Updated 9 months ago