A jupyter notebook that contains the main commands executed during a penetration test
☆73Sep 24, 2020Updated 5 years ago
Alternatives and similar repositories for MartianHacks
Users that are interested in MartianHacks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Apr 18, 2020Updated 5 years ago
- Tools to work with vulnerability standards.☆19Mar 19, 2014Updated 12 years ago
- Shell script to automate running the Nmap smb-security-mode.nse or RunFinger.py by lgandx and parse results into counts and lists of host…☆14Nov 3, 2017Updated 8 years ago
- Merge multiple nMap xml files into one☆50May 5, 2019Updated 6 years ago
- ☆19Oct 5, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- wifi attacks suite☆59Sep 24, 2020Updated 5 years ago
- ☆42Dec 22, 2020Updated 5 years ago
- A wrapper for Nmap to quickly run network scans☆147Sep 23, 2020Updated 5 years ago
- Burp extension to automatically drop requests that match a certain regex.☆10Mar 10, 2023Updated 3 years ago
- Custom scripts released for BSidesDC 2016☆14Oct 19, 2016Updated 9 years ago
- ☆17Apr 13, 2018Updated 7 years ago
- Copy as XMLHttpRequest BurpSuite extension☆32Mar 29, 2021Updated 4 years ago
- Visualize networks of phishing by querying the phishstats.info API☆79Aug 12, 2024Updated last year
- Sunburst IOCs for Splunk Ingest☆18Jan 28, 2021Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Splunk app to compare Endpoint Detection and Response solutions based on MITRE ATT&CK evaluations (APT3, APT29, Carbanak + FIN7, Wizard S…☆19Sep 5, 2022Updated 3 years ago
- Sentinel Recon Tools Workbook☆14Aug 24, 2022Updated 3 years ago
- Obsidian vault notes collection on Ethical Hacking Tools and Techniques, HackTheBox, and HTB Academy☆10Aug 15, 2023Updated 2 years ago
- ☆32Oct 21, 2023Updated 2 years ago
- Build macOS packages with GCP Container Builder☆22Dec 26, 2017Updated 8 years ago
- This repository contains generated contextual data utilized by pyattck.☆19Mar 3, 2025Updated last year
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆24May 1, 2014Updated 11 years ago
- Eureka is a forensic open source search tool that identifies specific structures in very, very large files (mostly, in memory dumps).☆19Mar 21, 2024Updated 2 years ago
- Python Scanner for passing IP addresses and utilizing AbuseIPdb API to find bad IPs☆60Jan 9, 2026Updated 2 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Convert asciinema JSON files to GIF for embedding in Github, Medium, email, Slack and more!☆10Sep 24, 2020Updated 5 years ago
- ☆26Jun 22, 2022Updated 3 years ago
- Accompanying documentation, images, source code and other stuff from the cybernomad.online blog☆27Sep 21, 2020Updated 5 years ago
- CCP, Kesha Williams, 11-5-2020☆20Jul 6, 2023Updated 2 years ago
- Source and static code for the MITRE ATLAS website☆17Feb 6, 2026Updated last month
- A password spraying wordlist generator. Takes breach data as a valid input in order to target password reuse.☆44Apr 10, 2019Updated 6 years ago
- ☆17Mar 28, 2023Updated 2 years ago
- Sharing Various Things☆22Jun 28, 2022Updated 3 years ago
- Search the ExploitDB with a little more control☆22Jun 4, 2017Updated 8 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- NetHunter android application☆21Nov 4, 2017Updated 8 years ago
- This tool will quickly search for exploitable binaries with SUID bit set in Linux and will output the method of exploitation from GTFObin…☆26Dec 29, 2020Updated 5 years ago
- This project deals with hierarchical classification of web pages based on dmoz dataset.☆14Apr 10, 2014Updated 11 years ago
- A community event for security researchers to share their favorite notebooks☆108Feb 15, 2024Updated 2 years ago
- ☆20Jul 2, 2021Updated 4 years ago
- Report and finding templates used by the Serpico reporting tool☆16Sep 26, 2018Updated 7 years ago
- Reconmap's web client written in React. Manage all your pentest projects from a single place.☆53Mar 14, 2026Updated last week