SamuraiWTF / samuraiwtfLinks
The main SamuraiWTF collaborative distro repo.
β539Updated 7 months ago
Alternatives and similar repositories for samuraiwtf
Users that are interested in samuraiwtf are comparing it to the libraries listed below
Sorting:
- A modular recon tool for pentestingβ260Updated 7 years ago
- Metasploit Cheat Sheet π£β455Updated 5 years ago
- Curated list of public penetration test reports released by several consulting firms and academic security groupsβ71Updated 8 years ago
- PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems assocβ¦β647Updated 4 years ago
- Official module repository for the Recon-ng Framework.β249Updated last year
- Virtual Machine for Adversary Emulation and Threat Huntingβ1,298Updated 9 months ago
- This is my cheatsheet and scripts developed while taking the Offensive Security Penetration Testing with Kali Linux course.β484Updated 4 years ago
- Dradis Framework: Collaboration and reporting for IT Security teamsβ749Updated this week
- β99Updated 8 months ago
- Both personal and public notes for EC-Council's CEHv10 312-50, because it's thousands of pages/slides of boredom, and a braindump to manβ¦β245Updated 5 years ago
- Complete solution for intentionally vulnerable webshop: "Juice Shop"β91Updated 9 years ago
- your offsec knowledgeβ469Updated 6 years ago
- A collection of security related Python and Bash shell scripts. Analyze hosts on generic security vulnerabilities. Wrapper around popularβ¦β280Updated last year
- This is a learning created by Omar Santos (@santosomar) for different Cybersecurity training sessions. It includes many intentionally vulβ¦β385Updated 3 months ago
- A list of shodan filtersβ577Updated 6 years ago
- Just a repo of random Python scripts to get pentesters started with the Python language on engagements.β217Updated 5 years ago
- Fast and easy script to manage pentesting training appsβ370Updated last year
- OWASP Honeypot, Automated Deception Framework.β468Updated last year
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security β¦β1,027Updated 5 years ago
- Blue Team Cheat Sheatsβ166Updated 9 years ago
- A list of the resources I use as I get ready for the examβ503Updated 3 years ago
- SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types iβ¦β98Updated this week
- This is a collection of legal wording and documentation used for physical security assessments. The goal is to hopefully allow this as a β¦β485Updated 5 years ago
- Network reconnaissance and vulnerability assessment tools.β402Updated 3 years ago
- One of the biggest annoyances of using Recon-ng is getting everything set up to use it. So here Iβll outline the different API keys it cβ¦β162Updated 7 years ago
- Official Black Hat Arsenal Security Tools Repositoryβ158Updated 3 years ago
- Vanquish is Kali Linux based Enumeration Orchestrator. Vanquish leverages the opensource enumeration tools on Kali to perform multiple acβ¦β506Updated 7 years ago
- SimplE RePort wrIting and COllaboration toolβ1,110Updated 5 years ago
- Study Guide for the CEH v10β431Updated 4 years ago
- β81Updated 5 years ago