Mario-Kart-Felix / solar-wind-hacker-bookLinks
2020 was a roller coaster of major, world-shaking events. We all couldn't wait for the year to end. But just as 2020 was about to close, it pulled another fast one on us: the SolarWinds hack, one of the biggest cybersecurity breaches of the 21st century. The SolarWinds hack was a major event not because a single company was breached, but becaus…
☆17Updated 3 years ago
Alternatives and similar repositories for solar-wind-hacker-book
Users that are interested in solar-wind-hacker-book are comparing it to the libraries listed below
Sorting:
- The big-tool is for installing all hacking and security tools !☆10Updated 3 years ago
- Advanced RDP Hacking Tool☆7Updated 2 years ago
- python keylogger and spying malware .☆13Updated last month
- ☆10Updated 6 months ago
- DirDar is a tool that searches for (403-Forbidden) directories to break it and get dir listing on it☆13Updated 4 years ago
- A curated list of GPT agents for cybersecurity☆9Updated 8 months ago
- A "dream-come-true" for hackers and penetration testers, Venom RAT has managed to bring the best of both worlds into a single tool. You w…☆13Updated last year
- A python tool for generating strong password☆11Updated 2 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Updated 3 years ago
- Collection of offensive tools targeting Microsoft Azure☆11Updated 2 years ago
- Collection of exploits that were verified by an automated system☆13Updated 3 years ago
- Network Scanner with Backdoor Detection, other Nmap resources and syn-protection detection☆33Updated last year
- Who We Are☆19Updated 9 months ago
- This config made in Phreakers madhureh☆8Updated 6 years ago
- Subdomain crawler with wordlist using python☆12Updated 5 years ago
-  # Ukraine-Cyber-Operations Cura…☆23Updated 3 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14Updated 6 years ago
- Run you Localhost Server☆19Updated 7 months ago
- A full-fledged msfrpc library for Metasploit framework.☆13Updated 7 years ago
- Red Teaming Tactics and Techniques☆14Updated 3 years ago
- Recon Automation for BugBounties☆11Updated 8 months ago
- In-depth Attack Surface Mapping and Asset Discovery☆12Updated 5 years ago
- Opensource for universities, educational institutions, research, IT / technology companies, NGOs, administrations, foundations, public in…☆10Updated 2 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆32Updated 2 years ago
- web network analyzer☆14Updated last year
- Python Keylogger PortScanner BruteForce and basic hack tools.(new ones will come soon)☆16Updated 4 years ago
- 14,412,680 views•23 Jan 2015 69K 10K SHARE SAVE Dr. Phil 5.85M subscribers Dr. Phil tells compelling stories about real people. Th…☆12Updated 4 years ago
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆14Updated 2 years ago
- A tool designed to analyse email headers☆34Updated 2 years ago