annalorimer / security-resources
A list of stuff to learn more about security!
☆23Updated 6 years ago
Alternatives and similar repositories for security-resources:
Users that are interested in security-resources are comparing it to the libraries listed below
- Phishing Toolkit☆20Updated 7 years ago
- Passive Spider uses search engines to find interesting information about a target domain.☆17Updated 11 years ago
- Honeypot for router backdoor (TCP 32764)☆18Updated 11 years ago
- List of Red Team Repositories☆17Updated 5 years ago
- ☆13Updated 7 years ago
- NAT Pinning test suite tool for penetration testers.☆30Updated 11 years ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆25Updated 7 years ago
- Cryptocurrencies related Security resources☆14Updated last year
- repo with compromised keys and such☆20Updated 2 years ago
- ☆12Updated 8 years ago
- OpSec in OSINT - An evolving guide on how to stay safe and private during open source intelligence investigations☆19Updated 7 years ago
- For collecting probed SSID name by wireless devices, Access point detail and connected clients.☆36Updated 10 years ago
- ☆49Updated 7 years ago
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆50Updated 7 years ago
- A tool that can help detect and takeover subdomains with dead DNS records☆12Updated 6 years ago
- ANWI - All New Wireless IDS☆27Updated 5 years ago
- Phishing e-mail repository☆37Updated 4 years ago
- SQL Injection without the pain of syringes.☆25Updated 7 years ago
- Framework for Making Environmental Keyed Payloads☆12Updated 8 years ago
- ☆27Updated 4 years ago
- Useful books, links, blogs, etc.☆14Updated 7 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆34Updated 2 years ago
- ☆14Updated 5 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Data exfiltration PoC scripts☆23Updated 9 years ago
- mOrc is a post-exploitation framework for macOS written in Bash☆20Updated last year
- A QEMU based framework for instrumenting x86 programs from Python☆17Updated 4 years ago
- New and Improved☆17Updated 8 years ago
- Search Nmap and Metasploit scanning scripts.☆54Updated 7 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆14Updated 9 years ago