brevityinmotion / straylight
☆50Updated 2 years ago
Related projects: ⓘ
- An auxiliary spellcheck dictionary that corresponds with the Bishop Fox Cybersecurity Style Guide☆82Updated last year
- All the common commands used in a red teaming operation or CTF. This is a work in progress and will be updated with time.☆42Updated 4 years ago
- Scripts and tools for AWS Pentest☆51Updated 3 years ago
- Another Subdomain ENumeration Tool☆10Updated last year
- This script is a multi-threaded Okta password sprayer.☆66Updated 8 months ago
- ☆27Updated 5 years ago
- A colorful cross-platform python script to test misconfigurations of AWS S3 buckets both through authenticated and unauthenticated checks…☆39Updated 3 years ago
- Publicly availalbe vulnarble by desgin vm/machines☆29Updated 2 years ago
- Simple parser framework.☆23Updated last year
- A cloud-backed password cracking and assessment tool - Sponsored by Open Security☆67Updated last year
- A Repository dedicated to creating modular and automated penetration testing frameworks utilizing Jupyter Notebooks☆142Updated 3 years ago
- ☆17Updated last year
- A collection of tools to find data that has been made public in cloud storage systems such as S3 Buckets and Digital Ocean Spaces☆65Updated 2 years ago
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆64Updated 2 years ago
- ☆14Updated this week
- Extensive code infrastructure for finding unintended information leaks in files, git repositories and much more.☆28Updated last year
- Helps with finding and registering categorized domains☆65Updated 3 years ago
- AWS Security Checks☆36Updated 6 years ago
- Automatic Sender Policy Framework Reconnaissance☆18Updated 6 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆30Updated last year
- KeepNote For OSCP Course☆22Updated 4 years ago
- ☆76Updated 4 years ago
- Scout - a Contactless Active Reconnaissance Tool☆49Updated last year
- ☆39Updated 2 months ago
- Resolves an IP address to the cloud provider it is hosted on☆86Updated last week
- Import Nmap scans to Cherrytree☆36Updated 2 years ago
- Scrap Latest Information Security Resources☆31Updated 3 years ago
- ☆19Updated 5 years ago
- Supporting material for my presentation "Adversarial Threat Modelling — A Practical Approach to Purple Teaming in the Enterprise"☆50Updated 2 years ago
- ☆36Updated this week