A meta-scan tool used to kick off a number of command-line security tools during VA/PT work.
☆23May 1, 2022Updated 3 years ago
Alternatives and similar repositories for mst
Users that are interested in mst are comparing it to the libraries listed below
Sorting:
- Find all hostnames related to a given domain. Helpful during VA/PT work.☆16May 1, 2022Updated 3 years ago
- My various configuration files for zsh, vim, tmux, etc.☆25May 1, 2022Updated 3 years ago
- This tool will harvest valid DNS subdomains from a given domain.☆76May 1, 2022Updated 3 years ago
- Does a dictionary lookup on common, valuable hostnames for a given domain.☆26May 1, 2022Updated 3 years ago
- The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available …☆49May 1, 2022Updated 3 years ago
- ☆34May 1, 2022Updated 3 years ago
- A repo for collecting and organizing security tools of various types. As new ones come out, they get added to the list.☆103May 1, 2022Updated 3 years ago
- Free tools for mobile testing.☆38May 1, 2022Updated 3 years ago
- A tracking system for everything me, e.g.: beliefs, passions, must-haves, must-dos, favorite movies, favorite quotes, favorite aphorisms,…☆29May 1, 2022Updated 3 years ago
- My tmux stuff☆35May 1, 2022Updated 3 years ago
- CUPP - Common User Passwords Profiler !☆15Jun 14, 2024Updated last year
- Official Black Hat Arsenal Security Tools Repository☆160May 1, 2022Updated 3 years ago
- A command-line snippets manager.☆17Nov 24, 2023Updated 2 years ago
- A Python program to scrape secrets from GitHub through usage of a large repository of dorks.☆14Jan 28, 2021Updated 5 years ago
- Wireless discovery and exploitation framework written in Python☆18Dec 17, 2010Updated 15 years ago
- Quick script to gather stats on incoming credentials and IPs for a honey listener.☆110Apr 30, 2022Updated 3 years ago
- This tool helps you to hack android device front camera☆18Sep 27, 2023Updated 2 years ago
- ☆12Jun 23, 2023Updated 2 years ago
- My Nginx configuration files, for all to use and improve upon.☆109May 1, 2022Updated 3 years ago
- A library-based attempt to increase our chances for achieving AI Alignment with an emergent AGI.☆20Apr 4, 2023Updated 2 years ago
- Tracking my journey towards earning my OSCP. This includes the process of everything that I learn along the way.☆47Nov 23, 2021Updated 4 years ago
- Wardriving ekoparty☆15Oct 9, 2017Updated 8 years ago
- Oracle Database 12c password brute forcer☆29Jun 18, 2015Updated 10 years ago
- Burp extension for automated handling of CSRF tokens☆16Feb 27, 2018Updated 8 years ago
- SSH Bruteforce Basic Script created with C++ to Linux☆10Jan 28, 2023Updated 3 years ago
- Post-Exploitation Tool to Steal MySQL Data, and with persistence extract all data from MySQL table every time that Windows are opened wit…☆14Apr 2, 2023Updated 2 years ago
- Python Script to Parse Phone # and E-mails from Websites☆10Mar 23, 2022Updated 3 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43May 18, 2017Updated 8 years ago
- How to Convert Bitcoin-PUBKEY HEX Public Keys to Base58 Bitcoin Address and Check Balance for BTC Coins☆11Aug 26, 2022Updated 3 years ago
- Exploit for Adobe Coldfusion BlazeDS Java Object Deserialization RCE☆11Feb 7, 2018Updated 8 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆13Aug 22, 2021Updated 4 years ago
- A repository for maintaining a list of the top domains based on multiple lists☆23May 1, 2022Updated 3 years ago
- Repo to host a comprehensive list of all my Public Gists with a short description for each item and a link to the Gist pages in question.…☆15Apr 27, 2021Updated 4 years ago
- Elliptic curve tools, ECDSA, and ECDSA attacks.☆10Oct 29, 2019Updated 6 years ago
- A list of the books that I am reading, with priorities.☆35May 1, 2022Updated 3 years ago
- An inventory of tools and resources about CyberSecurity that aims to help people to find everything related to CyberSecurity.☆13Jan 5, 2021Updated 5 years ago
- We have compiled an exhaustive list of cryptocurrency exchange hacks [ 2011 – 2022 ] – you will be amazed at how much has been stolen ove…☆12Dec 7, 2022Updated 3 years ago
- CEH V12 Training Kit (20 Modules)☆17Nov 15, 2024Updated last year
- Recon(Amass, Naabu, Nuclei) workflow with Github Actions☆17Nov 12, 2024Updated last year