desecsecurity / novo-pentest-profissionalLinks
Informações extras referentes ao Treinamento Novo Pentest Profissional - https://desecsecurity.com/novo-pentest-profissional
☆15Updated 2 years ago
Alternatives and similar repositories for novo-pentest-profissional
Users that are interested in novo-pentest-profissional are comparing it to the libraries listed below
Sorting:
- Script simples para análise de bytes para cabeçalhos IP e TCP/UDP de tamanho fixo de 20 bytes cada e também pacotes ARP☆13Updated 5 years ago
- Windows Reverse TCP backdoor☆29Updated 6 years ago
- ☆13Updated 3 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆13Updated 4 years ago
- Automatic cloud backup of Kali Linux data☆12Updated 5 years ago
- DirDar is a tool that searches for (403-Forbidden) directories to break it and get dir listing on it☆13Updated 4 years ago
- This program aims to check active targets by saving screenshots in a project.☆14Updated 6 months ago
- Active Directory information dumper via LDAP☆13Updated 5 years ago
- Public Exploits☆10Updated 4 years ago
- ☆13Updated 5 years ago
- The Fuzzil is a program which injects automatically data into a webpage and detect potential bugs.☆21Updated 5 years ago
- ProtOSINT is a Python script that helps you investigate Protonmail accounts and ProtonVPN IP addresses☆13Updated 3 years ago
- Training for Golang (go language)☆10Updated 6 years ago
- This is very basic automated recon script tool.☆18Updated last year
- ☆13Updated 6 years ago
- Simple Phishing Toolkit is a super easy to install and use phishing framework built to help Information Security professionals find human…☆29Updated 7 years ago
- Hand list of Powershell commands frequently used during penetration tests☆15Updated 7 years ago
- Methodoloy for pentesting web applications.☆10Updated 3 years ago
- Python 3 script for interacting with Shodan API☆20Updated last year
- Fuxsociety Mr Robot 2.1☆28Updated 2 years ago
- Identify the different types of hashes used to encrypt passwords.☆10Updated 8 years ago
- Check arbitrary file download vulnerability in the WordPress☆22Updated 5 years ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆12Updated 4 years ago
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆31Updated 2 years ago
- New Framework Red Team Operations☆19Updated 4 years ago
- Deploy multiple instances of Nessus in docker containers easily☆20Updated 4 years ago
- For finding secrets, tokens and other common mistakes made by developers.☆12Updated 2 months ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 3 years ago
- Notes on offensive training☆16Updated 8 years ago
- A collection of personal ZAP scripts☆13Updated 2 years ago