ecstatic-nobel / Aisle25Links
Detect leaks in security event logs.
☆20Updated 6 years ago
Alternatives and similar repositories for Aisle25
Users that are interested in Aisle25 are comparing it to the libraries listed below
Sorting:
- Pentest ToolKit☆28Updated 5 years ago
- urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Serve…☆36Updated 3 years ago
- Custom Maltego transforms☆68Updated 10 years ago
- ☆33Updated 9 months ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆23Updated 4 years ago
- My Dirty Scriptss ..!!!!! Pentest , OSINT , Python ,, Trainings☆54Updated 7 years ago
- CHEAT SHEET DE SEGURIDAD PARA ETHICAL HACKING & PENETRATION TESTING☆26Updated 8 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆30Updated 3 months ago
- An installation script to help with the setup of a Kali VM for The Hacker Playbook: Practical Guide To Penetration Testing by Peter Kim☆17Updated 10 years ago
- Use Tor for anonymous scanning with nmap☆85Updated 10 years ago
- Hand list of Powershell commands frequently used during penetration tests☆15Updated 7 years ago
- Use the Hacker Target IP Tools API for Reconnaissance in Maltego☆68Updated 4 years ago
- A curated list of awesome infosec resources.☆29Updated 10 years ago
- Open Penetration Testing Bookmarks Collection☆19Updated 10 years ago
- OSINT tool for testing privacy and social engineering vulnerability of organizations.☆93Updated 6 years ago
- Penetration Testing/Security Cheatsheets☆62Updated 10 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Updated 3 years ago
- Plugins for the King Phisher open source phishing campaign toolkit.☆85Updated 4 years ago
- A collection of scripts that pull Open Source Information from the web. Eventually the goal is to put this into a large modular style dat…☆56Updated 10 years ago
- Accompanying documentation, images, source code and other stuff from the cybernomad.online blog☆27Updated 5 years ago
- Look up an email domain (@example.com), using Python, across all known domains.☆45Updated 2 years ago
- DPE - Default Password Enumeration☆36Updated 12 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Updated 8 years ago
- Red Team Tool Kit☆16Updated 6 years ago
- Simple Phishing Toolkit is a super easy to install and use phishing framework built to help Information Security professionals find human…☆29Updated 7 years ago
- ☆15Updated 5 months ago
- A collection of open source and commercial tools that aid in red team operations.☆11Updated 6 years ago
- Silensec's Nyuki Forensics Investigator (Mobile Forensics)☆46Updated 8 years ago
- Generates payloads using msfvenom and open multi handler listener☆11Updated 7 years ago
- Proactive Computer Network Defense Strategy - OSINT Real Time Threat Stream - Social/DarkNet - Data Mining☆32Updated 13 years ago