danielmiessler / Books
A list of the books that I am reading, with priorities.
☆32Updated 2 years ago
Alternatives and similar repositories for Books:
Users that are interested in Books are comparing it to the libraries listed below
- A simple script for translating IP addresses to GeoLocations☆40Updated 2 years ago
- A Ruby script that takes in IPs and returns Country, State, and City☆38Updated 2 years ago
- Does a dictionary lookup on common, valuable hostnames for a given domain.☆25Updated 2 years ago
- Free tools for mobile testing.☆33Updated 2 years ago
- This tool will harvest valid DNS subdomains from a given domain.☆64Updated 2 years ago
- A tracking system for everything me, e.g.: beliefs, passions, must-haves, must-dos, favorite movies, favorite quotes, favorite aphorisms,…☆20Updated 2 years ago
- A meta-scan tool used to kick off a number of command-line security tools during VA/PT work.☆22Updated 2 years ago
- A repo for collecting and organizing security tools of various types. As new ones come out, they get added to the list.☆93Updated 2 years ago
- The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available …☆45Updated 2 years ago
- ☆27Updated 2 years ago
- Checks to see when the cert for a given domain expires.☆18Updated 2 years ago
- A repository for personal tracking.☆15Updated 2 years ago
- scripts to setup pentesting system and use during pentest☆18Updated 2 years ago
- Reconnaissance tool of Penetration test & Bug Bounty☆25Updated 6 years ago
- Find all hostnames related to a given domain. Helpful during VA/PT work.☆13Updated 2 years ago
- This project exists as a free (and transparent) alternative to paid services that show you what technologies are running on a given websi…☆50Updated 2 years ago
- Pentest ToolKit☆28Updated 5 years ago
- Get a number of your tweets from the Twitter API.☆10Updated 2 years ago
- ☆19Updated 9 years ago
- Scripts I have written to perform various IT Security admin tasks. From validating findings to performing automated attacks☆19Updated last week
- Official Black Hat Arsenal Security Tools Repository☆147Updated 2 years ago
- Use Tor for anonymous scanning with nmap☆80Updated 9 years ago
- An installation script to help with the setup of a Kali VM for The Hacker Playbook: Practical Guide To Penetration Testing by Peter Kim☆17Updated 9 years ago
- A collection of CTF solution types, i.e. not solutions to specific CTF challenges, but the general categories that those solutions fall u…☆56Updated 2 years ago
- A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.☆27Updated 9 years ago
- home! sweet home☆23Updated 5 years ago
- A copy of articles published at Peerlyst☆39Updated 8 years ago
- My Dirty Scriptss ..!!!!! Pentest , OSINT , Python ,, Trainings☆53Updated 6 years ago
- Quick script to gather stats on incoming credentials and IPs for a honey listener.☆108Updated 2 years ago
- Intelligence gathering framework☆14Updated 9 years ago