SamantazFox / cybersec-archiveLinks
Keeps track of what repos needs to be saved from the new Github " Exploits and malware policy"
☆23Updated 4 years ago
Alternatives and similar repositories for cybersec-archive
Users that are interested in cybersec-archive are comparing it to the libraries listed below
Sorting:
- ☆47Updated 4 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- ☆33Updated 5 months ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 3 years ago
- Multipurpose tool, currently aimed for HackTheBox Battlegrounds☆21Updated 4 years ago
- My Python Cookiecutter project template☆32Updated 2 years ago
- Lab Environment for learning client-side attacks such as CSRF, Clickjacking, XSS, and CORS abuse.☆20Updated 2 years ago
- autocrack adds queue support for hashcat cracking.☆41Updated 2 years ago
- Information-Gathering Shell Script☆30Updated 4 years ago
- OWASP Foundation Web Respository☆36Updated 3 years ago
- Sp00fer blog post -☆26Updated 2 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 7 months ago
- Create visualization from Shodan query☆73Updated 4 years ago
- A collection of OSCE preparation resources.☆24Updated 5 years ago
- recon-ng modules for Censys☆37Updated last year
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- A simple program to query nmap xml files in the terminal.☆27Updated 5 years ago
- Noob Penetration tester☆11Updated last year
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆10Updated 9 years ago
- Kali configuration optimized for red teaming/pentesting/CTFs☆20Updated last year
- ☆24Updated 5 years ago
- Basic tool to automate backdooring PE files☆55Updated 3 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- Finding sensitive information in the trimmed parts of cropped images☆30Updated 3 years ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆60Updated 3 years ago
- A golang tool that uses the dehashed.com API to search for compromised assets.☆9Updated 4 years ago
- Next Generation Phishing Tool For Internal / Red Teams☆35Updated 6 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- Skills To Improve Before Heading to OSCP☆15Updated 8 years ago