dxc-technology / ThreatDeck
A cyber security-focused playing card game
☆13Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for ThreatDeck
- Build a phishing server (Gophish) together with SMTP-redirector (Postfix) automatically in Digital Ocean with terraform and ansible..☆19Updated 3 years ago
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆42Updated last year
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆38Updated 2 years ago
- multiple password 'asher using Python’s hashlib☆14Updated 3 years ago
- A tool to parse, deduplicate, and query multiple port scans.☆57Updated last year
- Interactsh deployment to AWS EC2 Instance with Terraform☆11Updated 2 years ago
- ☆18Updated 3 weeks ago
- A collection of python apps and shell scripts to email an xlsx spreadsheet of new vulnerabilities in the NIST CVE database and their asso…☆12Updated 4 years ago
- autocrack adds queue support for hashcat cracking.☆42Updated last year
- Signatures for wraith used to detect secrets across various sources☆15Updated 2 years ago
- A multi-threaded password sprayer based on Medusa, built for distributed spraying.☆37Updated 3 years ago
- Validate proxies for specific domain☆34Updated 3 years ago
- S3 bucket enumerator☆29Updated 5 years ago
- Continuous kerberoast monitor☆43Updated last year
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 2 years ago
- A bash script that automates the scanning of a target network for HTTP resources through XXE☆37Updated 3 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- ☆16Updated 2 years ago
- ☆10Updated 5 years ago
- Take domains on stdin and output them on stdout if they get resolved☆33Updated 2 years ago
- Reconmap's web client written in React. Manage all your pentest projects from a single place.☆52Updated this week
- pwncat module that automatically exploits CVE-2021-4034 (pwnkit)☆32Updated 2 years ago
- OWASP Foundation Web Respository☆35Updated 3 years ago
- Finding sensitive information in the trimmed parts of cropped images☆28Updated 2 years ago
- This extension redacts potentially sensitive header and parameter values from requests using Shannon Entropy analysis.☆12Updated 3 years ago
- Left To My Own Devices - NT hash tools☆31Updated 2 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆13Updated 7 months ago