davidalex89 / Infosec-DealsLinks
Ongoing Infosec Deals
☆111Updated 9 months ago
Alternatives and similar repositories for Infosec-Deals
Users that are interested in Infosec-Deals are comparing it to the libraries listed below
Sorting:
- SunBurst DGA Decode Script☆207Updated 4 years ago
- SolarWinds Orion Account Audit / Password Dumping Utility☆354Updated last year
- ☆101Updated 4 years ago
- ☆168Updated last year
- An ongoing list of virtual cybersecurity conferences.☆122Updated 4 years ago
- A modular OSINT honeypot for blue teamers☆339Updated 2 years ago
- Easy links and guides for DEF CON 28 and 29☆57Updated 4 years ago
- A CVE Heatmap Using CalPlot☆97Updated 4 years ago
- ATTPwn☆215Updated last year
- Bento Toolkit is a minimal fedora-based container for penetration tests and CTF with the sweet addition of GUI applications.☆78Updated 4 years ago
- Getting Genymotion & Burpsuite setup for Android Mobile App Analysis☆161Updated 5 years ago
- A Docker container for remote penetration testing.☆139Updated 4 years ago
- Resources for DFIR Professionals Responding to the REvil Ransomware Kaseya Supply Chain Attack☆183Updated 4 years ago
- JSON DataSet for macOS mapped to MITRE ATT&CK Tactics.☆156Updated 4 years ago
- Purple Teaming Attack & Hunt Lab - Terraform☆160Updated 3 years ago
- List of Repositories☆99Updated 3 years ago
- scylla.sh db dumps and more☆138Updated 5 years ago
- A bash script that automates the exfiltration of data over dns in case we have blind command execution on a server with egress filtering☆210Updated 4 years ago
- Whalescan is a vulnerability scanner for Windows containers, which performs several benchmark checks, as well as checking for CVEs/vulner…☆156Updated 2 years ago
- Pentesting/Bugbounty Dockerfiles.☆177Updated 4 years ago
- Red Team C2 Infrastructure built in AWS using Ansible!☆230Updated 4 years ago
- Collection of scripts & fingerprinting tricks for Shodan.io☆253Updated 5 years ago
- Proofs of Concept. Just fucking around.☆193Updated 3 years ago
- This repo contains logstash of various honeypots☆174Updated 5 years ago
- A repo of how stuff works, written/gathered right from the basics, so it serves both as a manual and a starting guide.☆62Updated 4 years ago
- Hashes for vulnerable LOG4J versions☆155Updated 3 years ago
- Browser Shortcuts for Cyber Security Related Online Services☆78Updated 4 years ago
- Collection of created MindMaps☆151Updated last year
- Tools for investigating Log4j CVE-2021-44228☆94Updated 3 years ago
- Web-Scale NoSQL Idempotent Cloud-Native Big-Data Serverless Plaintext Credential Search☆186Updated last year