Somerset-Recon / furbo-researchLinks
Furbo Security Research
☆41Updated 2 years ago
Alternatives and similar repositories for furbo-research
Users that are interested in furbo-research are comparing it to the libraries listed below
Sorting:
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Updated 3 years ago
- Collection of my slide decks, conference videos and research white papers☆27Updated 2 months ago
- A tool to run nmap against each line in a script.☆17Updated 4 years ago
- ☆23Updated last year
- Interactsh deployment to AWS EC2 Instance with Terraform☆12Updated 3 years ago
- wordlists for password cracking☆28Updated 3 years ago
- Take domains on stdin and output them on stdout if they get resolved☆33Updated 3 years ago
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆43Updated 2 years ago
- Finding sensitive information in the trimmed parts of cropped images☆30Updated 3 years ago
- DIT is a DTLS MitM proxy implemented in Python 3. It can intercept, manipulate and suppress datagrams between two DTLS endpoints and supp…☆59Updated 3 years ago
- An experiment to address digital intelligence archiving on offensive engagements.☆26Updated 5 years ago
- Register your Kubernetes IPs to monitor.shodan.io☆19Updated 3 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 5 years ago
- ☆60Updated 2 years ago
- A tool for enumerating and retrieving exposed git repositories to recover source trees from external environments. Can utilise File Inclu…☆23Updated 5 years ago
- Tool to automate takeover of DigitalOcean Kubernetes cluster. Check out the blog post for more info.☆17Updated 6 years ago
- Man in the Browser Framework☆50Updated 10 months ago
- A shortlist of core ServiceNow tables.☆15Updated 2 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆25Updated last year
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆90Updated 3 years ago
- Legba recipes.☆51Updated last year
- details about DIAL protocol vulnerabilities☆30Updated last year
- Standardizing Security Titles☆13Updated 2 years ago
- recon-ng modules for Censys☆38Updated 2 years ago
- ☆27Updated 2 years ago
- PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.☆48Updated 3 years ago
- Faraday Agent Dispatcher launches any security tools and send results to Faradaysec Platform.☆46Updated 3 weeks ago
- Simple S3 Bucket Testing Software☆31Updated 4 years ago
- Bypassing AWS WAF using a single ';'☆40Updated 7 years ago
- Nmap and NSE command line wrapper in the style of Metasploit☆44Updated 3 years ago