danielmiessler / BugOutBag
BugOutBag
☆63Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for BugOutBag
- The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available …☆45Updated 2 years ago
- A repo for collecting and organizing security tools of various types. As new ones come out, they get added to the list.☆89Updated 2 years ago
- A swiss army knife for pentesting Windows/Active Directory environments☆48Updated 8 years ago
- Maltego integration of https://haveibeenpwned.com☆58Updated 9 months ago
- An installation script to help with the setup of a Kali VM for The Hacker Playbook: Practical Guide To Penetration Testing by Peter Kim☆16Updated 9 years ago
- Use Tor for anonymous scanning with nmap☆79Updated 9 years ago
- Scripts that are suited for blue teams☆33Updated 8 years ago
- Quick script to gather stats on incoming credentials and IPs for a honey listener.☆107Updated 2 years ago
- A few transforms and a machine for parsing Nmap XML results☆35Updated 8 years ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆34Updated 8 years ago
- Digital Forensics and Incident Response Wiki☆39Updated 10 years ago
- Bash script to install Honeypot projects ona Raspbian System☆26Updated 9 years ago
- A collection of useful scripts for penetration testers☆81Updated 12 years ago
- ☆73Updated 10 years ago
- Metasploit Framework☆27Updated 10 years ago
- Maltego CaseFile entities for information security investigations, malware analysis and incident response☆63Updated 6 years ago
- ☆61Updated 6 years ago
- Metasploit Usage Wiki☆48Updated 9 years ago
- Shodan.io Command Line Interface☆44Updated 3 years ago
- ☆19Updated 9 years ago
- OSINT Threat Intel Interface - CLI for HoneyDB☆113Updated 5 years ago
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.☆43Updated 9 years ago
- A quick and dirty PCAP parser that helps you identify who your applications are sending sensitive data to without encryption.☆101Updated 9 months ago
- Security tool to trace URL's jumps across the rel links to obtain the last URL☆48Updated last year
- Take output from nmap and turn it into something easily searchable and readable.☆33Updated 8 years ago
- Reconnaissance scripts for penetration testing☆57Updated 9 years ago
- Linux setup tool for Kali Linux☆77Updated 6 years ago
- Malicious Link Blog☆24Updated last year
- A collection of CTF solution types, i.e. not solutions to specific CTF challenges, but the general categories that those solutions fall u…☆57Updated 2 years ago
- ☆15Updated 8 years ago