SamantazFox / cybersec-archive
Keeps track of what repos needs to be saved from the new Github " Exploits and malware policy"
☆22Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for cybersec-archive
- Noob Penetration tester☆10Updated 6 months ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 2 years ago
- Sp00fer blog post -☆25Updated 2 years ago
- Pentesting notes☆17Updated last year
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆72Updated this week
- Tactics, Techniques, and Procedures☆19Updated 8 months ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 2 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆13Updated 7 months ago
- TheSprayer is a cross-platform tool designed to help penetration testers spray passwords against an Active Directory domain without locki…☆28Updated 2 years ago
- Information-Gathering Shell Script☆29Updated 4 years ago
- ☆47Updated 3 years ago
- Simple C2 over the Trello API☆37Updated last year
- Subdomain Enumeration and Scanner☆32Updated 4 years ago
- autocrack adds queue support for hashcat cracking.☆42Updated last year
- Ideaslocas Repository☆37Updated 3 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- A simple program to query nmap xml files in the terminal.☆26Updated 4 years ago
- ☆34Updated 6 years ago
- A collection of commands, scripts, tips, tricks, and other information compiled during my journey to obtaining the OSCP certification.☆22Updated 3 years ago
- ☆36Updated 2 years ago
- Central IoC scanner based on Loki☆20Updated 3 years ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆59Updated 3 years ago
- Notes and helper scripts/files/etc from when I passed my OSCP☆18Updated 5 years ago
- Custom pentesting tools☆24Updated 4 years ago
- ☆14Updated 4 years ago