SharonBrizinov / secfeed
Security feed, done in the stupid simple way
☆23Updated last week
Alternatives and similar repositories for secfeed:
Users that are interested in secfeed are comparing it to the libraries listed below
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆21Updated last week
- User enumeration and password spraying tool for testing Azure AD☆68Updated 2 years ago
- Burp Suite Extension for inserting a magic byte into responder's request☆21Updated last year
- ☆17Updated last year
- My Offensive Security OSWA certification experience and my personal opinion what helps in preparation for the exam☆38Updated last year
- ☆27Updated last year
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆62Updated 4 months ago
- A collection of everything I learn while working as a pentester, doing certifications, bug bounty hunting or playing CTFs.☆17Updated this week
- Tools used for Pentesting☆22Updated last year
- ☆32Updated last month
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆65Updated this week
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆21Updated 2 months ago
- A small red team course☆34Updated last year
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆106Updated 2 months ago
- A tool for quickly evaluating IAM permissions in AWS.☆57Updated last year
- Various AD tools needed for penetration testing in one place.☆23Updated last year
- Linux Post-Exploitation tools wrapper☆20Updated last year
- OSCP Study Guide☆40Updated 2 years ago
- C2 Automation using Linode☆78Updated 2 years ago
- API fuzzer that exposes security flaws by sending malformed inputs☆14Updated 4 months ago
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆24Updated 4 months ago
- Collection of Tools & Techniques for analyzing URLs☆30Updated last year
- Review of AWAE.OSWE☆31Updated 2 years ago
- Enumerate AWS permissions and resources.☆66Updated 2 years ago
- ☆25Updated this week
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆33Updated last year
- "Terrible Thick Client" is a vulnerable application developed in C# .NET framework.☆19Updated last year
- Learning resources and external resources to help you prepare for your offsec certifications☆52Updated 2 months ago
- This repository contains a comprehensive testing designed for evaluating the performance and resilience of Endpoint Detection and Respons…☆47Updated 3 months ago
- ☆41Updated 2 years ago