MLHale / CYBR8950
This repository services the UNO Cybersecurity capstone (CYBR 4580/8950)
☆10Updated 6 months ago
Related projects ⓘ
Alternatives and complementary repositories for CYBR8950
- A curated list of Cloud Security techniques and tools☆30Updated last year
- Appilot is a Platform for ready to use Social Media Automation Bots on Real Devices, Android and Emulators. NO ADB, NO LAPTOP Needed.☆18Updated 3 weeks ago
- A repo containing simple programs to ease pentester with generated commands to avoid syntax issues☆13Updated 4 years ago
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆12Updated 4 years ago
- ☆11Updated 3 years ago
- A repository for maintaining a list of the top domains based on multiple lists☆20Updated 2 years ago
- Create machine images containing the Nessus vulnerability scanner☆11Updated 3 weeks ago
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- A meta-scan tool used to kick off a number of command-line security tools during VA/PT work.☆21Updated 2 years ago
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆14Updated 4 years ago
- Deploy multiple instances of Nessus in docker containers easily☆20Updated 3 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆14Updated 4 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Updated 4 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 4 years ago
- ☆10Updated 11 months ago
- Computer Network Exploitation (CNE) Field Manual☆13Updated 7 months ago
- introduction to distributed scanning using vultr☆11Updated 7 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- Empire is a PowerShell and Python 3.x post-exploitation framework.☆16Updated 4 years ago
- Automated process to build and distribute Posture & Exposure Reports' bi-weekly to customers.☆17Updated 9 months ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆17Updated last year
- Training scenarios for cyber ranges☆11Updated 4 years ago
- Principles and commands for penetration testing and OSCP☆9Updated 4 years ago
- Yet another OSINT automator.☆19Updated 4 years ago
- Orchestrate gatherer, scanner, saver, and trustymail_reporter☆14Updated this week
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Updated 3 years ago
- Miscellaneous for various things☆22Updated this week
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆21Updated 5 years ago