danielmiessler / BugOutBagLinks
BugOutBag
☆68Updated 3 years ago
Alternatives and similar repositories for BugOutBag
Users that are interested in BugOutBag are comparing it to the libraries listed below
Sorting:
- A repo for collecting and organizing security tools of various types. As new ones come out, they get added to the list.☆102Updated 3 years ago
- A quick and dirty PCAP parser that helps you identify who your applications are sending sensitive data to without encryption.☆119Updated 2 years ago
- A swiss army knife for pentesting Windows/Active Directory environments☆50Updated 9 years ago
- An installation script to help with the setup of a Kali VM for The Hacker Playbook: Practical Guide To Penetration Testing by Peter Kim☆17Updated 10 years ago
- Homemade scripts to-do various vulnerable challenges☆78Updated 5 years ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆35Updated 9 years ago
- Linux setup tool for Kali Linux☆80Updated 7 years ago
- Pentester Automation Tool☆45Updated 5 years ago
- devops scripts☆33Updated 9 years ago
- The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available …☆48Updated 3 years ago
- Just a collection of pentest stuffs☆94Updated 6 years ago
- ☆75Updated 11 years ago
- A collection of useful scripts for penetration testers☆83Updated 13 years ago
- Pentest dropbox setup scripts for Kali Linux☆90Updated 9 years ago
- Script to create Kali Linux Amazon Machine Images (AMIs)☆93Updated 6 years ago
- The VAPT Toolkit provides a streamlined way to install, configure, and maintain a complete penetration testing environment with 50+ secur…☆32Updated last week
- scripts for pentesting☆86Updated 7 years ago
- Pillage is a multithreaded enumeration python script I created for the enumeration phase of penetration tests.☆26Updated 9 years ago
- ☆84Updated 2 years ago
- Penetration Testing/Security Cheatsheets☆64Updated 10 years ago
- Python Tool for Host Enumeration☆50Updated 8 years ago
- Maltego integration of https://haveibeenpwned.com☆61Updated 10 months ago
- A collection of CTF solution types, i.e. not solutions to specific CTF challenges, but the general categories that those solutions fall u…☆57Updated 3 years ago
- Nix Audit made easier (RHEL, CentOS)☆65Updated 9 months ago
- ☆61Updated 7 years ago
- Malicious Link Blog☆25Updated 2 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Updated 8 years ago
- Vulnerable web site. Used to test sentinel features.☆11Updated 9 years ago
- Bluewall is a firewall framework designed for offensive and defensive cyber professionals.☆106Updated 6 years ago
- password cracking front end☆57Updated 5 years ago