A jupyter notebook that contains the main commands executed during a penetration test
☆73Sep 24, 2020Updated 5 years ago
Alternatives and similar repositories for MartianHacks
Users that are interested in MartianHacks are comparing it to the libraries listed below
Sorting:
- Tools to work with vulnerability standards.☆19Mar 19, 2014Updated 11 years ago
- A quick bash script that I created in order to speed up the creation of usable kali boxes.☆11Oct 29, 2021Updated 4 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Apr 18, 2020Updated 5 years ago
- ☆32Oct 21, 2023Updated 2 years ago
- Obsidian vault notes collection on Ethical Hacking Tools and Techniques, HackTheBox, and HTB Academy☆10Aug 15, 2023Updated 2 years ago
- OpenWRT installation script☆17Sep 20, 2016Updated 9 years ago
- ☆17Apr 13, 2018Updated 7 years ago
- 64bit Windows 10 shellcode that adds user BOKU:SP3C1ALM0V3 to the system and the localgroups Administrators & "Remote Desktop Users"☆39May 3, 2021Updated 4 years ago
- Custom scripts released for BSidesDC 2016☆14Oct 19, 2016Updated 9 years ago
- Module for Qubes OS to integrate Yubikey authentication through a USB VM☆19Feb 24, 2018Updated 8 years ago
- Libro en inglés de la documentación co-escrita con la comunidad de habla hispana☆14Feb 15, 2018Updated 8 years ago
- Sunburst IOCs for Splunk Ingest☆18Jan 28, 2021Updated 5 years ago
- ☆20Jul 2, 2021Updated 4 years ago
- Splunk app to compare Endpoint Detection and Response solutions based on MITRE ATT&CK evaluations (APT3, APT29, Carbanak + FIN7, Wizard S…☆19Sep 5, 2022Updated 3 years ago
- Visualize networks of phishing by querying the phishstats.info API☆79Aug 12, 2024Updated last year
- CCP, Kesha Williams, 11-5-2020☆20Jul 6, 2023Updated 2 years ago
- Theme changer plugin for OpenMediaVault☆20Apr 29, 2019Updated 6 years ago
- Eureka is a forensic open source search tool that identifies specific structures in very, very large files (mostly, in memory dumps).☆19Mar 21, 2024Updated last year
- Automatic tool using for crawling code to find low-hang fruit vulnerabilities - Based on OWASP Secure Code Review Guide☆21Aug 31, 2020Updated 5 years ago
- Search the ExploitDB with a little more control☆22Jun 4, 2017Updated 8 years ago
- Incident Response Methodologies (IRM), also called Incident Playbook, based on the work done by the CERT Societe General☆24Dec 16, 2021Updated 4 years ago
- ☆19Oct 5, 2020Updated 5 years ago
- Nmap script to check vulnerability CVE-2021-21972☆28Mar 3, 2021Updated 5 years ago
- My first trial at Ethical Hacking Write Ups☆23Jul 23, 2020Updated 5 years ago
- Rest API Client to automate Nessus Scanning☆25Feb 25, 2023Updated 3 years ago
- Copy as XMLHttpRequest BurpSuite extension☆32Mar 29, 2021Updated 4 years ago
- Reconmap's web client written in React. Manage all your pentest projects from a single place.☆52Updated this week
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆24May 1, 2014Updated 11 years ago
- CVE-2024-4879 - Jelly Template Injection Vulnerability in ServiceNow☆26Jul 13, 2024Updated last year
- This tool will quickly search for exploitable binaries with SUID bit set in Linux and will output the method of exploitation from GTFObin…☆26Dec 29, 2020Updated 5 years ago
- Script to automate, manage, and multithread Nikto scans.☆63Feb 12, 2020Updated 6 years ago
- ☆26Jun 22, 2022Updated 3 years ago
- AWS Security Checks☆40Jan 18, 2018Updated 8 years ago
- ☆33Aug 25, 2021Updated 4 years ago
- Accompanying documentation, images, source code and other stuff from the cybernomad.online blog☆27Sep 21, 2020Updated 5 years ago
- Comprehensive AWS cloud reconnaissance and privilege escalation toolkit written in Python. Features IAM, EC2, S3, Lambda, ECS, Secrets Ma…☆49Jul 8, 2025Updated 7 months ago
- CSIRT Jump Bag