danielmiessler / dotfiles
☆13Updated this week
Related projects: ⓘ
- Determine privileges from cloud credentials via brute-force testing.☆63Updated 3 weeks ago
- ☆17Updated 2 years ago
- Nuclei plugins to audit Chrome extensions☆64Updated 2 months ago
- Signature based honeypot detector tool written in Golang☆74Updated 4 months ago
- This tool analyzes a given Gitlab repository and searches for dangling or force-pushed commits containing potential secret or interesting…☆38Updated last month
- TIE is a machine learning model for inferring associated MITRE ATT&CK techniques from previously observed techniques.☆14Updated last week
- Repository that contains a set of purposefully erroneous Yara rules.☆47Updated 8 months ago
- An experiment to address digital intelligence archiving on offensive engagements.☆24Updated 3 years ago
- ☆18Updated 6 months ago
- ☆40Updated this week
- A curated list of VULNERABLE APPS and SYSTEMS which can be used as PENETRATION TESTING PRACTICE LAB.☆19Updated last year
- An LLM and OCR based Indicator of Compromise Extraction Tool☆28Updated 5 months ago
- Modular web-application honeypot platform built using go and gin☆52Updated 4 months ago
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆27Updated 6 months ago
- Oh-my-zsh theme for pentesters which includes the date, time, and IP address for pentest logging.☆40Updated 7 months ago
- Secret Scanner for Slack, Jira, Confluence, Asana, Wrike and Linear☆39Updated 3 weeks ago
- Repository of tools and resources for analyzing Docker containers☆57Updated 10 months ago
- The Atomic Playbook contains TTPs from the MITRE ATT&CK framework mapped to the tests in the Atomic Red Team. It serves as a single resou…☆28Updated 8 months ago
- Enumerate AWS permissions and resources.☆62Updated 2 years ago
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆38Updated 9 months ago
- An Evil OIDC Server☆49Updated last year
- AutoPoC Generator HoneyPoC☆32Updated 2 months ago
- ☆58Updated last year
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆38Updated last year
- Qemuno Framework☆23Updated 2 years ago
- Leak patterns for LeakTK tools to use☆8Updated this week
- Provides an overview of the inner file structure of a PDF☆24Updated last year
- tool for identifying guest relationships between companies☆83Updated 2 months ago
- DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)☆38Updated 3 years ago