LimberDuck / nessus-cheat-sheetLinks
Nessus Cheat Sheet in HTML, PDF, PNG, ADOC
☆12Updated 3 years ago
Alternatives and similar repositories for nessus-cheat-sheet
Users that are interested in nessus-cheat-sheet are comparing it to the libraries listed below
Sorting:
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆20Updated last year
- A collection of cybsecurity tools, software, libraries, learning tutorials, frameworks, academic and practical resources in security.☆17Updated last year
- Dictionary cracking tool for HTTP Digest challenge/response hashes☆32Updated 2 years ago
- An ongoing curated collection of awesome software, libraries, frameworks, talks & videos, best practices, learning tutorials and importan…☆20Updated 3 years ago
- A jupyter notebook that contains the main commands executed during a penetration test☆73Updated 5 years ago
- Repo to hold my PowerShell Scripts☆17Updated 3 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆13Updated 5 years ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆75Updated last year
- Various Cheat Sheets (e.g. Nmap, Metasploit, Common Ports, Subnetting, Wireshark, etc)☆53Updated 5 years ago
- Run Capture the Flags and Security Trainings with OWASP WrongSecrets☆53Updated last week
- Accompanying documentation, images, source code and other stuff from the cybernomad.online blog☆27Updated 5 years ago
- An experimental Velociraptor implementation using cloud infrastructure☆26Updated 3 weeks ago
- ☆25Updated 6 months ago
- My very personal and opinionatedly organized infosec/cybersec sources in one OPML file☆58Updated 3 years ago
- Resource links (video, slides & code) for my conference talks | presentations | workshops☆21Updated last month
- Documentation and tools to curate Sigma rules for Windows event logs into easier to parse rules.☆16Updated 2 months ago
- Links to materials referenced in the SANS Tech Tuesday workshop June 30,2020☆28Updated 5 years ago
- Lazy SPL to detect Spring4Shell exploitation☆12Updated 3 years ago
- A PoC backdoor that uses Gmail as a C&C server☆13Updated 5 years ago
- ☆34Updated 2 years ago
- A learning and testing environment for web application hacking and pentesting.☆27Updated 4 years ago
- OWASP Amass Docker Compose for setting up a full instance of the infrastructure☆50Updated this week
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆23Updated 2 years ago
- The purpose of these documents, it was to execute several efficiency and detection tests in some endpoint solutions, this document brings…☆18Updated 5 years ago
- ETM enables the creation of detailed attack graphs and figures while calculating the risk associated with your attack narratives. ETM was…☆26Updated 2 years ago
- NSE script which leverages the Censys Search API for passive data collection☆57Updated 4 years ago
- A Content Discovery and Development Platform. Empowering Cybersecurity, AI, Marketing, and Finance professionals and researchers to disco…☆51Updated this week
- Provides an overview of the inner file structure of a PDF☆24Updated 3 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆25Updated last year
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Updated 3 years ago