☆52Feb 10, 2026Updated last month
Alternatives and similar repositories for devsecops-policy-scanner
Users that are interested in devsecops-policy-scanner are comparing it to the libraries listed below
Sorting:
- ☆54Dec 14, 2025Updated 3 months ago
- Bash scripts to automate the burpsuite's certificate configuration and proxying of an Android device for penetration test.☆19May 26, 2025Updated 9 months ago
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Sep 14, 2024Updated last year
- Can run a payload shellcode in-memory by injecting a process. (does not bypass AV).☆16Sep 1, 2025Updated 6 months ago
- ☆15Nov 18, 2020Updated 5 years ago
- A deliberately vulnerable mobile banking application designed for practicing mobile security testing. Features common vulnerabilities fou…☆83Nov 25, 2025Updated 3 months ago
- Beginner Road map that paves the way for your journey into the captivating world of cyber security based on job roles.☆25Jan 27, 2024Updated 2 years ago
- Knowledge Management for Offensive Security Professionals Official Repository☆151Feb 25, 2025Updated last year
- ☆34Oct 25, 2023Updated 2 years ago
- A collection of config files for linux focusing on hackthebox theme☆53Oct 10, 2025Updated 5 months ago
- With zero dependencies, NetCredz extracts credentials from pcap files or live traffic, supporting NTLM, LDAP, HTTP, SMTP, SNMP, Telnet, F…☆78Dec 2, 2024Updated last year
- Transition form local file inclusion attacks to remote code exection☆68Aug 26, 2020Updated 5 years ago
- My notes containing the Certified Red Team Professional Course☆71Sep 7, 2024Updated last year
- A fast enumeration tool for publicly exposed Azure Storage blobs.☆117Mar 25, 2023Updated 2 years ago
- Simplify your life with leak detection in JavaScript. NipeJS streamlines the use of regex, making it effortless to uncover potential leak…☆95Aug 9, 2024Updated last year
- Save your dorking results to the terminal. A modified version of TomNomNom's amazing tool!☆98Mar 4, 2025Updated last year
- This is CheatSheet which I used on PJPT exam to fully compromise Domain Controller by doing internal network penentration testing.☆81Aug 20, 2023Updated 2 years ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆150May 3, 2024Updated last year
- This repository updates latest Bug Bounty medium writeups every 10 minutes, https://readmedium.com/Medium_URL, https://archive.ph/Medium_…☆160Updated this week
- A list of all Active Directory machines from HackTheBox☆221Mar 2, 2026Updated 2 weeks ago
- A fast, minimalistic scanner for time-based SQL injection (SQLi) detection – built in Go.☆140May 7, 2025Updated 10 months ago
- Active Directory Mindmap Recipes: A Compromise à la Carte☆151Sep 4, 2025Updated 6 months ago
- Python script to decrypt passwords stored by mRemoteNG☆176Jul 6, 2023Updated 2 years ago
- Enumerate / Dump Docker Registry☆182Apr 10, 2024Updated last year
- Collection of useful pre-compiled .NET binaries or other executables for penetration testing Windows Active Directory environments☆256Mar 2, 2026Updated 2 weeks ago
- PNPT Exam Preparation - TCM Security☆171Jul 25, 2021Updated 4 years ago
- A free software to find the components installed in Joomla CMS, built out of the ashes of Joomscan.☆247Aug 1, 2023Updated 2 years ago
- POC exploit for CVE-2024-49138☆267Feb 14, 2025Updated last year
- Awesome Penetration Testing A collection of awesome penetration testing resources☆251Oct 19, 2023Updated 2 years ago
- .NET post-exploitation toolkit for Active Directory reconnaissance and exploitation☆398Jul 23, 2025Updated 7 months ago
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆350Oct 22, 2024Updated last year
- Advanced Active Directory network topology analyzer with SMB validation, multiple authentication methods (password/NTLM/Kerberos), and co…☆657Jan 16, 2026Updated 2 months ago
- PoC Exploit for the NTLM reflection SMB flaw.☆686Feb 18, 2026Updated last month
- Mind maps / flow charts to help with privilege escalation on the OSCP.☆394Dec 19, 2020Updated 5 years ago
- A deliberately vulnerable banking application designed for practicing Security Testing of Web App, APIs, AI integrated App and secure cod…☆634Updated this week
- A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfve…☆592Jun 12, 2024Updated last year
- Collection of Notes and CheatSheets used for Red teaming Certs☆497Feb 13, 2023Updated 3 years ago
- ☆478Oct 7, 2022Updated 3 years ago
- Pen Test Report Generation and Assessment Collaboration☆592Mar 11, 2026Updated last week