UMD-CS-STICs / 389Rfall18
CMSC389R course at UMD
☆9Updated 4 years ago
Related projects: ⓘ
- Hacking, pen-testing, and cyber-security related tools built with Python.☆35Updated 3 years ago
- ☆19Updated 8 years ago
- Curated list of public penetration test reports released by several consulting firms and academic security groups☆10Updated 4 years ago
- urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Serve…☆34Updated 2 years ago
- SecRep Is a Repository That Contain Useful Intrusion, Penetration and Hacking Archive Including Tools List, Cheetsheet and Payloads☆19Updated 5 years ago
- Telnet-2 allows to connect via Tor and define a custom timeout☆10Updated 5 years ago
- Fuzz for hidden proxies, vhosts, and URLs☆16Updated 3 years ago
- Curated list of ransomware-related resources; awesome style.☆12Updated last year
- Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection☆27Updated 4 months ago
- Python - Metasploit-Framework Database Management☆14Updated 4 years ago
- ☆27Updated this week
- Web App Pen Tester (Web Interface)☆29Updated last year
- pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching☆11Updated 2 years ago
- An Instagram Open Source Intelligence Tool☆20Updated 5 years ago
- A tool to speed up Android pentesting by automating the APK acquisition and information gathering☆18Updated 2 years ago
- Pentest ToolKit☆27Updated 4 years ago
- BDsploit (Big Data Exploitation and Post-exploitation Toolkit)☆5Updated 7 months ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Updated 3 years ago
- ☆21Updated this week
- Use the Hacker Target IP Tools API for Reconnaissance in Maltego☆50Updated 3 years ago
- Information gathering tool - OSINT☆33Updated 5 years ago
- ☆22Updated this week
- A collection of penetration testing tools written in Python 2☆15Updated 5 years ago
- Coursera Stanford Cryptography 1 - Thought by Prof. Dan Boneh☆33Updated 7 years ago
- Repo for all the Recon and enum techniques, Exploitation, Priv-escalation (Linux and Windows), post exploitation☆16Updated 4 years ago
- Notes on offensive training☆15Updated 6 years ago
- ☆18Updated this week
- 🍭 Web Application Vulnerability Scanner 🍭☆14Updated 2 years ago
- Payloads and Lists☆19Updated 4 years ago
- recon-ng Maltego local transform pack☆37Updated 10 years ago