LimberDuck / nessus-cheat-sheetLinks
Nessus Cheat Sheet in HTML, PDF, PNG, ADOC
☆11Updated 3 years ago
Alternatives and similar repositories for nessus-cheat-sheet
Users that are interested in nessus-cheat-sheet are comparing it to the libraries listed below
Sorting:
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 5 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆18Updated last year
- List of sources for cybersecurity news☆37Updated 2 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆37Updated 4 years ago
- My very personal and opinionatedly organized infosec/cybersec sources in one OPML file☆57Updated 2 years ago
- Meeps Security is a gamified cybersecurity training and awareness framework. In the game, players handle incoming calls about cybersecuri…☆18Updated last week
- nTask is a distributed task management program that allows you to distribute tasks across multiple computers using API communication and …☆14Updated last month
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆71Updated last year
- The purpose of these documents, it was to execute several efficiency and detection tests in some endpoint solutions, this document brings…☆18Updated 4 years ago
- Resource links (video, slides & code) for my conference talks | presentations | workshops☆16Updated last week
- A PoC backdoor that uses Gmail as a C&C server☆14Updated 5 years ago
- A collection of cybsecurity tools, software, libraries, learning tutorials, frameworks, academic and practical resources in security.☆15Updated last year
- Windows File Integrity -- an archive of information on installed Windows binaries.☆30Updated 3 years ago
- Collection of videos of Raids on Cybercriminals☆20Updated 5 months ago
- An optimized Python3 library to fetch the most recent exploit-database, create searchable indexes for CVE->EDBID and EDBID -> CVE, and pr…☆30Updated 10 months ago
- An experiment to address digital intelligence archiving on offensive engagements.☆25Updated 4 years ago
- Provides an overview of the inner file structure of a PDF☆25Updated 2 years ago
- Check whether an IP address or hostname belongs to popular cloud providers☆68Updated this week
- Hackers Don't Give A Shit☆16Updated 5 years ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆35Updated 9 months ago
- Data from Dark Web Marketplace scraping - Be careful☆40Updated 10 months ago
- Daily updates from leaked data search engines, aggregators and similar services.☆112Updated this week
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Updated 3 years ago
- Internal Network Penetration Test Playbook☆21Updated 4 years ago
- Dictionary cracking tool for HTTP Digest challenge/response hashes☆32Updated 2 years ago
- ☆12Updated 7 months ago
- Mitre ATT&CK framework tactics and techniques in markdown format for best use in Obsidian☆18Updated last year
- Handy scripts and one-liners to make life easier☆37Updated 2 years ago
- This repo contains a list of vendors that hide their security advisories, alerts, notices, vulnerabilities, and more behind either a payw…☆32Updated last year
- Run Capture the Flags and Security Trainings with OWASP WrongSecrets☆52Updated this week