annalorimer / security-resourcesLinks
A list of stuff to learn more about security!
☆23Updated 7 years ago
Alternatives and similar repositories for security-resources
Users that are interested in security-resources are comparing it to the libraries listed below
Sorting:
- (Abandoned) Extract packages from an Android device☆51Updated 4 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆34Updated 3 years ago
- A refresh of LazyKali which simplifies install of tools and configuration. Original author appears missing.☆47Updated 8 years ago
- Phishing Toolkit☆20Updated 7 years ago
- repo with compromised keys and such☆23Updated 2 years ago
- OpSec in OSINT - An evolving guide on how to stay safe and private during open source intelligence investigations☆20Updated 8 years ago
- ☆12Updated 9 years ago
- Phishing e-mail repository☆37Updated 5 years ago
- NAT Pinning test suite tool for penetration testers.☆31Updated 11 years ago
- A copy of articles published at Peerlyst☆40Updated 8 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Updated 11 years ago
- A while back antirez, in a post to Bugtraq, detailed a new Tcp portscan method.☆16Updated 8 years ago
- The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available …☆46Updated 3 years ago
- DPE - Default Password Enumeration☆34Updated 12 years ago
- Dr. Mine is a node script written to aid automatic detection of in-browser cryptojacking.☆48Updated 5 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Updated 12 years ago
- The 802.11 Hacking Repo.☆37Updated 10 years ago
- Static Binary Deployer. Download and deploy *Nix utilities on a compromised system.☆28Updated 5 years ago
- Capture-The-Flag(CTF) toolkit☆11Updated 10 years ago
- For collecting probed SSID name by wireless devices, Access point detail and connected clients.☆37Updated 11 years ago
- Hacking environment installation scripts for OS X☆27Updated 3 years ago
- Collection of Android security related resources☆103Updated last year
- Python - Human Interface Device Android Attack Framework☆47Updated 8 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆14Updated 10 years ago
- A tool to discover bygonessl vulnerabilities using the facebook API☆20Updated 5 years ago
- Advanced Reconnaissance Framework — Google Chrome extension☆24Updated 9 years ago
- Use Tor for anonymous scanning with nmap☆84Updated 10 years ago
- Tools and scripts for penetration testing☆19Updated 5 years ago
- Cryptocurrencies related Security resources☆14Updated 2 years ago
- Pentester's Tools Parser (PTP) provides an unified way to retrieve the information from all (final goal) automated pentesting tools and a…☆31Updated 2 years ago