Th3l0newolf / Desktop-WorkStation-Endpoint-Security-CheckListLinks
☆13Updated 3 years ago
Alternatives and similar repositories for Desktop-WorkStation-Endpoint-Security-CheckList
Users that are interested in Desktop-WorkStation-Endpoint-Security-CheckList are comparing it to the libraries listed below
Sorting:
- Checks whether a domain is hosted on a cloud service such as AWS, Azure or CloudFlare☆59Updated 2 years ago
- ☆34Updated 2 years ago
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆45Updated 2 years ago
- My Offensive Security OSWA certification experience and my personal opinion what helps in preparation for the exam☆41Updated 2 years ago
- This repository has workflows created for https://github.com/RikunjSindhwad/Task-Ninja☆23Updated 3 months ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Updated 3 years ago
- ☆22Updated 2 years ago
- Script to automate, when possible, the passive reconnaissance performed on a website prior to an assessment.☆38Updated 2 weeks ago
- King of Bug Bounty Tips Simple Tool☆13Updated 4 years ago
- Simultaneously search CVEs and exploits across multiple cybersecurity data sources.☆13Updated 3 years ago
- Workshop & Talk Slide Decks from HackSpaceCon☆25Updated last year
- A simple automation tool to detect lfi, rce and ssti vulnerability☆56Updated 3 years ago
- Comprehensive AWS cloud reconnaissance and privilege escalation toolkit written in Python. Features IAM, EC2, S3, Lambda, ECS, Secrets Ma…☆45Updated 4 months ago
- Attack Surface Discovery Tool☆110Updated last year
- ☆20Updated 4 years ago
- This repository provides a comprehensive Digital Footprint Checklist to help individuals manage their online presence and enhance privacy…☆15Updated 10 months ago
- PassMute - A multi featured Password Transmutation/Mutator Tool☆53Updated 2 years ago
- ☆15Updated 2 years ago
- ☆24Updated 6 years ago
- Damn Vulnerable PHP Application (DVPA) - It is Lab Written in The PHP lang, Which Contains PHP Type Juggling - RCE Challenges☆33Updated 3 years ago
- Tools used for Pentesting☆21Updated 2 years ago
- Do It Yourself! (DIY) Web Penetration Testing is a guideline in performing security test cases against web applications☆39Updated 2 years ago
- Intentionally Vulnerable Nodejs Application & APIs☆22Updated 3 years ago
- Automated tool for domains & Subdomains Gathering☆14Updated last year
- An automated, reliable scanner for the Log4Shell (CVE-2021-44228) vulnerability.☆45Updated 9 months ago
- Go script to guess an API key / OAuth token found during pentest. CLI version of https://github.com/daffainfo/apiguesser-web/☆45Updated 3 years ago
- Tracking my journey towards earning my OSCP. This includes the process of everything that I learn along the way.☆47Updated 3 years ago
- Manage attack surface data on Elasticsearch☆23Updated last year
- New Framework Red Team Operations☆19Updated 4 years ago
- ☆18Updated 2 years ago