danielmiessler / Books
A list of the books that I am reading, with priorities.
☆32Updated 3 years ago
Alternatives and similar repositories for Books
Users that are interested in Books are comparing it to the libraries listed below
Sorting:
- Does a dictionary lookup on common, valuable hostnames for a given domain.☆25Updated 3 years ago
- A simple script for translating IP addresses to GeoLocations☆42Updated 3 years ago
- A Ruby script that takes in IPs and returns Country, State, and City☆40Updated 3 years ago
- Free tools for mobile testing.☆34Updated 3 years ago
- A tracking system for everything me, e.g.: beliefs, passions, must-haves, must-dos, favorite movies, favorite quotes, favorite aphorisms,…☆21Updated 3 years ago
- ☆19Updated 10 years ago
- Intelligence gathering framework☆14Updated 9 years ago
- This tool will harvest valid DNS subdomains from a given domain.☆65Updated 3 years ago
- devops scripts☆33Updated 8 years ago
- Checks to see when the cert for a given domain expires.☆19Updated 3 years ago
- Find all hostnames related to a given domain. Helpful during VA/PT work.☆15Updated 3 years ago
- scripts to setup pentesting system and use during pentest☆18Updated 2 years ago
- A meta-scan tool used to kick off a number of command-line security tools during VA/PT work.☆23Updated 3 years ago
- Pentest ToolKit☆28Updated 5 years ago
- Use Tor for anonymous scanning with nmap☆84Updated 9 years ago
- A repo for collecting and organizing security tools of various types. As new ones come out, they get added to the list.☆94Updated 3 years ago
- Red Teaming with Kali Linux. OS Customization, additional tools, and automated updates☆12Updated 8 years ago
- Reconnaissance tool of Penetration test & Bug Bounty☆25Updated 6 years ago
- The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available …☆45Updated 3 years ago
- Light Armoured Recon is a python script designed to automate passive recon. It automates execution of TheHarvester, whois, Robtex.com, Bu…☆38Updated 7 years ago
- home! sweet home☆23Updated 5 years ago
- change mac address without using macchanger (NetworkManager9 clone bug)☆18Updated 8 years ago
- OSINT Browser Plugins☆39Updated 7 years ago
- Kali Linux Wireless Penetration Testing Beginner's Guide - Third Edition, published by Packt☆27Updated 2 years ago
- Quick script to gather stats on incoming credentials and IPs for a honey listener.☆110Updated 3 years ago
- A repository for personal tracking.☆15Updated 3 years ago
- Shodan.io Command Line Interface☆44Updated 3 years ago
- An installation script to help with the setup of a Kali VM for The Hacker Playbook: Practical Guide To Penetration Testing by Peter Kim☆17Updated 9 years ago
- Scripts I have written to perform various IT Security admin tasks. From validating findings to performing automated attacks☆19Updated 2 months ago
- Detect leaks in security event logs.☆21Updated 6 years ago