JonmarCorpuz / aEnumLinks
Automatic Enumeration is a command line utility that automatically tries to collect and retrieve various pieces of information from a target machine during red team operations
☆16Updated 8 months ago
Alternatives and similar repositories for aEnum
Users that are interested in aEnum are comparing it to the libraries listed below
Sorting:
- RedAudit is a next-generation Windows forensic and security assessment framework featuring a live cyber-operations GUI built for real inv…☆34Updated last month
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆87Updated last month
- CHOMTE.SH is a powerful shell script designed to automate reconnaissance tasks during penetration testing. It utilizes various Go-based t…☆131Updated last year
- A second brain for storing knowledge gained from academic pursuits, certifications, and technical projects in a clear, bite-sized format …☆26Updated this week
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Support☆36Updated last year
- ☆27Updated last year
- ☆35Updated last year
- A curated list of cloud pentesting resource, contains AWS, Azure, Google Cloud☆138Updated 3 years ago
- ☆35Updated 9 months ago
- ☆137Updated 7 months ago
- This project is a Terraform-based implementation for deploying a Security Operations Center (SOC) using Kali Linux in AWS. It provides an…☆117Updated last year
- APIsec|SCAN - Free API security testing using Github actions☆102Updated last year
- A comprehensive Windows security auditing and threat detection toolkit. Features 58 production-ready PowerShell functions organized into …☆69Updated 2 months ago
- A curated list of tools and resources that I use daily as a Purple-Team operator.☆93Updated 7 months ago
- AutoPentestX – Linux Automated Pentesting & Vulnerability Reporting Tool☆74Updated last month
- ☆55Updated last year
- Python-Based Log Analyzer That Detects Brute-Force Attacks, Directory Traversal, And Suspicious Behavior In System Or Web Server Logs. B…☆19Updated 8 months ago
- ☆103Updated 3 months ago
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆76Updated last year
- A simple pentest container equipped with common python pentest tools.☆42Updated 2 months ago
- List of questions, answers and random notes for security interviews☆70Updated 4 years ago
- Garudaastra Tool is based on python3 to find cameras around the world☆28Updated 2 years ago
- A deliberately vulnerable mobile banking application designed for practicing mobile security testing. Features common vulnerabilities fou…☆73Updated last month
- Comprehensive AWS cloud reconnaissance and privilege escalation toolkit written in Python. Features IAM, EC2, S3, Lambda, ECS, Secrets Ma…☆48Updated 6 months ago
- gRPC Goat is a "Vulnerable by Design" lab created to provide an interactive, hands-on playground for learning and practicing gRPC securit…☆50Updated 3 months ago
- A network logging tool that logs per process activities☆32Updated 2 years ago
- Challenge Python☆19Updated 2 years ago
- ☆252Updated 3 months ago
- Cloud subdomains identification tool☆63Updated 8 months ago
- OWASP Amass Docker Compose for setting up a full instance of the infrastructure☆51Updated last week