Somerset-Recon / furbo-researchLinks
Furbo Security Research
☆39Updated 2 years ago
Alternatives and similar repositories for furbo-research
Users that are interested in furbo-research are comparing it to the libraries listed below
Sorting:
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Updated 2 years ago
- Interactsh deployment to AWS EC2 Instance with Terraform☆12Updated 3 years ago
- Collection of my slide decks & conference videos☆27Updated 4 years ago
- python3 scripts to help with aws triage needs☆15Updated 3 years ago
- My very personal and opinionatedly organized infosec/cybersec sources in one OPML file☆57Updated 2 years ago
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆43Updated last year
- An experiment to address digital intelligence archiving on offensive engagements.☆25Updated 4 years ago
- ☆58Updated 2 years ago
- Simple S3 Bucket Testing Software☆31Updated 3 years ago
- Faraday Agent Dispatcher launches any security tools and send results to Faradaysec Platform.☆45Updated this week
- A tool to run nmap against each line in a script.☆17Updated 4 years ago
- SMBScan is a tool to enumerate file shares on an internal network.☆45Updated last month
- Standardizing Security Titles☆13Updated 2 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Updated 3 years ago
- Legba recipes.☆50Updated 11 months ago
- A tool for enumerating and retrieving exposed git repositories to recover source trees from external environments. Can utilise File Inclu…☆23Updated 4 years ago
- Collection of Slides From My Conference Talks☆20Updated 2 years ago
- Finding sensitive information in the trimmed parts of cropped images☆30Updated 3 years ago
- wordlists for password cracking☆28Updated 2 years ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆70Updated last year
- ☆18Updated 9 months ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 5 years ago
- Provides an overview of the inner file structure of a PDF☆25Updated 2 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- DVRPi is a RaspberryPi 4B firmware designed to teach hardware hacking through intentional vulnerabilities.☆38Updated last month
- Still point in moving world.☆51Updated 2 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 9 months ago
- details about DIAL protocol vulnerabilities☆29Updated last year
- A collection of tools adversaries commonly use in an attack.☆14Updated 8 months ago
- Take domains on stdin and output them on stdout if they get resolved☆33Updated 3 years ago