RedWolfIntelligence / Open-Source-Security-List-Links
This list of tools is meant to act as a staple resource for Small to Medium businesses. We understand the hardship of not being able to afford adequate security. We are firm believers that everyone deserves to be secure at a cost effective rate.
☆49Updated 5 years ago
Alternatives and similar repositories for Open-Source-Security-List-
Users that are interested in Open-Source-Security-List- are comparing it to the libraries listed below
Sorting:
- Linux bash tool for Enumeration & Privilege Escalation☆56Updated 6 years ago
- Automated Enumeration Script for Pentesting☆34Updated 4 years ago
- This repo is dedicated to all my tricks, tweaks and modules for testing and hunting threats. This repo contains multiple directories whic…☆56Updated 7 years ago
- Scout - a Contactless Active Reconnaissance Tool☆53Updated 2 years ago
- This tool can be used to enumerate the subdomains associated with a company by aggregating the results of multiple OSINT (Open Source Int…☆144Updated 2 years ago
- Easy links and guides for DEF CON 28 and 29☆57Updated 4 years ago
- NebulousAD automated credential auditing tool.☆155Updated 5 years ago
- ☆82Updated 5 years ago
- Collection of OSCP study material && tools.☆78Updated 6 years ago
- Just a collection of pentest stuffs☆94Updated 5 years ago
- Repository of resources for configuring a Red Team SIEM using Elastic☆101Updated 7 years ago
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆66Updated 5 years ago
- rules to identify files containing juicy information like usernames, passwords etc☆128Updated 7 years ago
- Penetration Testing/Security Cheatsheets☆61Updated 9 years ago
- Repo contains a list of random scripts that I use while testing out random things.☆48Updated 6 years ago
- Simulating Adversary Operations☆94Updated 7 years ago
- Mitre Att&ck Technique Emulation☆82Updated 6 years ago
- A collection of scripts I've written to help red and blue teams with malware persistence techniques.☆127Updated 7 years ago
- GreyNoise Query Language☆82Updated 6 years ago
- A toolkit for Security Researchers☆127Updated 5 years ago
- Linux setup tool for Kali Linux☆79Updated 6 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Updated 6 years ago
- thethe☆116Updated 4 years ago
- Principles of MITRE ATT&CK in the fraud domain☆35Updated 6 years ago
- Professionally Evil Web Application Penetration Testing 101☆143Updated 5 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆54Updated 8 months ago
- Nmap Script to scan for Winnti infections☆70Updated 7 years ago
- CMS Detection and Exploitation suite - Scan WordPress, Joomla, Drupal and over 170 other CMSs☆30Updated 6 years ago
- Repo containing docker-compose files and setup scripts without having to clone the individual reternal components☆110Updated 4 years ago
- CPH:SEC - Copenhagen Ethical Hacking and Penetration Testing Society☆43Updated 2 years ago