crypt0rr / kbLinks
kb=$(cat sillynotes.txt)
☆47Updated last week
Alternatives and similar repositories for kb
Users that are interested in kb are comparing it to the libraries listed below
Sorting:
- Script for importing Nmap results into a Neo4j Graph Database☆24Updated 8 months ago
- Script to perform some hashcracking logic automagically☆80Updated 2 months ago
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆99Updated 2 years ago
- InfoSec Notes☆60Updated last year
- A Python native library containing lots of useful functions to write efficient scripts to hack stuff.☆41Updated 2 months ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆45Updated 5 years ago
- ☆109Updated last year
- ☆10Updated 2 years ago
- Collection of danish base wordlists for cracking danish passwords (Hashcat, John the Ripper etc.)☆29Updated 3 years ago
- quick and dirty proof-of-concept to hide shells in images☆51Updated last year
- Small python script wrapper for automating hashcat commands☆38Updated 5 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆38Updated 3 years ago
- CIS Benchmark testing of Windows SIEM configuration☆45Updated 2 years ago
- Ease and assist the compromise of an Active Directory environment.☆30Updated 4 years ago
- Bloodhound Portable for Windows☆53Updated 2 years ago
- Assess Windows OS for security misconfigurations and hardening opportunities.☆35Updated last year
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆116Updated 4 years ago
- Google Meet Phishing Template For Gophish☆48Updated 3 years ago
- ☆76Updated last year
- Field guide to gather low-hanging fruits☆14Updated 10 months ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆76Updated last year
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆31Updated last year
- Fast website scraper and wordlist generator☆82Updated 8 months ago
- Distributed phishing framework designed to streamline offensive security phishing☆41Updated 2 years ago
- Timestomp Tool to flatten MAC times with a specific timestamp☆49Updated last month
- A port scanner written purely in PowerShell.☆83Updated 2 years ago
- Automate the build of a vulnerable AD environment.☆39Updated 3 years ago
- Files to automatically deploy red team Active Directory test lab☆48Updated 3 years ago
- This repository contains a mindmap for different techniques for using Censys Search☆15Updated 4 months ago
- CLI & library to search for default credentials among thousands of Products / Vendors☆69Updated 4 years ago