censys-workshop / censys-search-mindmap
This repository contains a mindmap for different techniques for using Censys Search
☆12Updated last year
Alternatives and similar repositories for censys-search-mindmap:
Users that are interested in censys-search-mindmap are comparing it to the libraries listed below
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆14Updated 7 years ago
- Active Directory information dumper via LDAP☆12Updated 4 years ago
- ☆27Updated last year
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆25Updated last year
- Convert Nmap output for integration with other Project Discovery tools☆14Updated last year
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆20Updated 9 months ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆18Updated last year
- This is a simple Python script that connects to a MISP instance and retrieves attributes of specific types (such as IP addresses, URLs, a…☆16Updated last year
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 4 years ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated 9 months ago
- Central IoC scanner based on Loki☆20Updated 3 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆10Updated 8 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 6 months ago
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Updated last year
- Distributed phishing framework designed to streamline offensive security phishing☆39Updated last year
- just manipulatin these here tokens yes sir nothing weird☆22Updated 2 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆9Updated 2 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- LetMeOutOfYour.net Resources☆20Updated 4 years ago
- Scripts to help automate tedious red teaming enumeration and tasks.☆16Updated 4 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated last month
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆38Updated 2 years ago
- Easily-guessable Password Generator for Password Spray Attack☆20Updated 4 years ago
- Finding sensitive information in the trimmed parts of cropped images☆28Updated 3 years ago
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Updated 3 years ago