LimberDuck / nessus-cheat-sheet
Nessus Cheat Sheet in HTML, PDF, PNG, ADOC
☆11Updated 2 years ago
Related projects: ⓘ
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 4 years ago
- Take domains on stdin and output them on stdout if they get resolved☆33Updated 2 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Updated 2 years ago
- Content Discovery Development Platform. A tool to create your own CD solution. This is the new official repo for the project, old C++ and…☆32Updated this week
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆12Updated 6 months ago
- Webhood is a privately hosted URL scanner used by threat hunters and security analysts for analyzing phishing and malicious sites.☆23Updated this week
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 2 years ago
- This is a collection of ZAProxy Automation Tools and scripts to automate security tests of WEB Applications and WEB Sites☆23Updated last year
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆25Updated 5 years ago
- Nessus Audit files☆30Updated last year
- An experimental Velociraptor implementation using cloud infrastructure☆21Updated 2 weeks ago
- Finding sensitive information in the trimmed parts of cropped images☆28Updated 2 years ago
- passat - password auditing tool. Does statistical analyses on large sets of cracked passwords.☆22Updated 2 years ago
- A tool to parse, deduplicate, and query multiple port scans.☆57Updated last year
- Lab Environment for learning client-side attacks such as CSRF, Clickjacking, XSS, and CORS abuse.☆20Updated last year
- HttpDoom is a tool for response-based inspection of websites across a large amount of hosts for quickly gaining an overview of HTTP-base…☆22Updated 3 years ago
- ☆14Updated this week
- Source code for the Binaries of OWASP WrongSecrets☆9Updated 2 months ago
- ☆15Updated 2 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 3 months ago
- ☆12Updated this week
- 🛜 T-Pot Mobile - The All In One Wireless Honeypot Solution 🍯☆31Updated 4 months ago
- InfoSec OpenAI Examples☆19Updated 9 months ago
- This extension redacts potentially sensitive header and parameter values from requests using Shannon Entropy analysis.☆12Updated 3 years ago
- Ideaslocas Repository☆37Updated 3 years ago
- Virtual Security Operations Center☆49Updated last year
- Pure Honeypots with an automated bash script☆19Updated 3 years ago
- ☆26Updated this week
- A tool for testing objects' permissions in AWS buckets☆39Updated 3 years ago
- Generic Signature Format for SIEM Systems☆14Updated 2 years ago