Leviathan36 / MartianHacksLinks
A jupyter notebook that contains the main commands executed during a penetration test
☆74Updated 5 years ago
Alternatives and similar repositories for MartianHacks
Users that are interested in MartianHacks are comparing it to the libraries listed below
Sorting:
- A collection of tools to find data that has been made public in cloud storage systems such as S3 Buckets and Digital Ocean Spaces☆76Updated 3 years ago
- SANS Slingshot Linux Distribution☆53Updated 4 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- GUI tool which enables you to parse nessus scan files from Nessus and Tenable.SC by (C) Tenable, Inc. and exports results to a Microsoft …☆106Updated last month
- Penetration Testing/Security Cheatsheets☆62Updated 9 years ago
- Import Nmap scans to Cherrytree☆37Updated 3 years ago
- ☆35Updated 2 years ago
- Dictionary cracking tool for HTTP Digest challenge/response hashes☆32Updated 2 years ago
- Links to materials referenced in the SANS Tech Tuesday workshop June 30,2020☆29Updated 5 years ago
- recon-ng modules for Censys☆38Updated last year
- NSE script which leverages the Censys Search API for passive data collection☆58Updated 3 years ago
- CLI tool and python module which enables you to parse nessus scan files from Nessus and Tenable.SC by (C) Tenable, Inc.☆46Updated last month
- PenText system: Easily create beautiful looking penetration test quotes, reports, and documents in many formats (PDF, text, JSON, CSV, ..…☆129Updated last week
- A cloud-backed password cracking and assessment tool - Sponsored by Open Security☆70Updated 2 years ago
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆62Updated 4 years ago
- Reconnaissance and Enumeration automation script☆53Updated 4 years ago
- Black Friday deals (Cyber/OSINT/Infosec)☆29Updated 4 years ago
- This tool can be used to enumerate the subdomains associated with a company by aggregating the results of multiple OSINT (Open Source Int…☆144Updated 2 years ago
- Curated list of public penetration test reports released by several consulting firms and academic security groups☆19Updated 4 years ago
- Just a collection of pentest stuffs☆94Updated 5 years ago
- Easy links and guides for DEF CON 28 and 29☆57Updated 4 years ago
- Automatically exported from code.google.com/p/nipper-ng☆70Updated 3 years ago
- Lure - User Recon Automation for GoPhish☆167Updated 2 years ago
- Empower your enumeration during OSCP☆36Updated 6 years ago
- Parse .nessus file(s) and shows output in interactive UI☆157Updated 5 months ago
- This list of tools is meant to act as a staple resource for Small to Medium businesses. We understand the hardship of not being able to a…☆49Updated 5 years ago
- Helpful tools for interacting with a GoPhish phishing instance☆50Updated last week
- Passive internal reconnaissance tool☆72Updated 2 years ago
- Python command line tool used for generating GIAC Certification indexes.☆27Updated 2 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 10 months ago