SamuraiWTF / samuraiwtfLinks
The main SamuraiWTF collaborative distro repo.
β545Updated 9 months ago
Alternatives and similar repositories for samuraiwtf
Users that are interested in samuraiwtf are comparing it to the libraries listed below
Sorting:
- A modular recon tool for pentestingβ261Updated 7 years ago
- Metasploit Cheat Sheet π£β462Updated 5 years ago
- Official module repository for the Recon-ng Framework.β255Updated last year
- PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems assocβ¦β648Updated 4 years ago
- Curated list of public penetration test reports released by several consulting firms and academic security groupsβ78Updated 8 years ago
- Virtual Machine for Adversary Emulation and Threat Huntingβ1,308Updated 11 months ago
- This is my cheatsheet and scripts developed while taking the Offensive Security Penetration Testing with Kali Linux course.β485Updated 4 years ago
- Vanquish is Kali Linux based Enumeration Orchestrator. Vanquish leverages the opensource enumeration tools on Kali to perform multiple acβ¦β510Updated 7 years ago
- Both personal and public notes for EC-Council's CEHv10 312-50, because it's thousands of pages/slides of boredom, and a braindump to manβ¦β245Updated 5 years ago
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security β¦β1,030Updated 5 years ago
- Blue Team Cheat Sheatsβ165Updated 9 years ago
- Dradis Framework: Collaboration and reporting for IT Security teamsβ767Updated last week
- A list of the resources I use as I get ready for the examβ503Updated 3 years ago
- Network reconnaissance and vulnerability assessment tools.β401Updated 3 years ago
- OWASP Honeypot, Automated Deception Framework.β472Updated last year
- Complete solution for intentionally vulnerable webshop: "Juice Shop"β95Updated 9 years ago
- A list of shodan filtersβ582Updated 7 years ago
- SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types iβ¦β98Updated this week
- Just a repo of random Python scripts to get pentesters started with the Python language on engagements.β218Updated 5 years ago
- Violent Python scripts used in book and few other required filesβ63Updated 7 years ago
- This is a learning created by Omar Santos (@santosomar) for different Cybersecurity training sessions. It includes many intentionally vulβ¦β411Updated last week
- DNS Recon | Brute Forcer | DNS Zone Transfer | DNS Wild Card Checks | DNS Wild Card Brute Forcer | Email Enumeration | Staff Enumeration β¦β651Updated 3 years ago
- your offsec knowledgeβ476Updated 6 years ago
- β233Updated 5 years ago
- This is a collection of legal wording and documentation used for physical security assessments. The goal is to hopefully allow this as a β¦β491Updated 6 years ago
- Fast and easy script to manage pentesting training appsβ376Updated last year
- Custom Tools and Notes from my own Penetration Testing Experienceβ283Updated 2 years ago
- Wireshark Cheat Sheetβ412Updated 5 years ago
- A collection of random OSINT scriptsβ477Updated 3 years ago
- An ongoing list of virtual cybersecurity conferences.β121Updated 4 years ago