censys-workshop / censys-search-mindmap
This repository contains a mindmap for different techniques for using Censys Search
☆13Updated last year
Alternatives and similar repositories for censys-search-mindmap
Users that are interested in censys-search-mindmap are comparing it to the libraries listed below
Sorting:
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆19Updated last year
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- ☆29Updated 2 years ago
- Build a phishing server (Gophish) together with SMTP-redirector (Postfix) automatically in Digital Ocean with terraform and ansible..☆20Updated 3 years ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated last year
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- Post-exploitation tool☆26Updated 4 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated 9 months ago
- Serving files with conditions, serverside keying and more.☆18Updated 2 years ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆41Updated 4 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 3 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- ☆28Updated last year
- LetMeOutOfYour.net Resources☆20Updated 4 years ago
- This contains common OSCP local exploits and enumeration scripts☆11Updated 9 years ago
- Central IoC scanner based on Loki☆20Updated 3 years ago
- An easy way to convert BloodHound output files into data that can be imported into reporting software like Dradis and Plextrac. Built by …☆18Updated 4 years ago
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Updated 3 years ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated last year
- A python script file to statically and dynamically investigate and analyse binary files for buffer overflow exploits.☆10Updated 11 months ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆14Updated 7 years ago
- Validate proxies for specific domain☆36Updated 3 years ago
- Melee: Tool to Detect Infections in MySQL Instances☆22Updated last year
- Cobalt Strike/C2 Servers☆13Updated 4 years ago
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆27Updated 2 weeks ago
- ☆18Updated 4 years ago
- Pythonize Intruder Payload☆13Updated 4 years ago
- parsers to make life easier☆13Updated 4 years ago
- just manipulatin these here tokens yes sir nothing weird☆22Updated 3 years ago