ecstatic-nobel / Aisle25Links
Detect leaks in security event logs.
☆20Updated 6 years ago
Alternatives and similar repositories for Aisle25
Users that are interested in Aisle25 are comparing it to the libraries listed below
Sorting:
- urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Serve…☆36Updated 3 years ago
- Pentest ToolKit☆28Updated 5 years ago
- My Dirty Scriptss ..!!!!! Pentest , OSINT , Python ,, Trainings☆54Updated 7 years ago
- Custom Maltego transforms☆68Updated 10 years ago
- ☆33Updated 7 months ago
- Use the Hacker Target IP Tools API for Reconnaissance in Maltego☆66Updated 4 years ago
- Silensec's Nyuki Forensics Investigator (Mobile Forensics)☆46Updated 8 years ago
- DPE - Default Password Enumeration☆35Updated 12 years ago
- Submits multiple domains to VirusTotal API☆60Updated 3 years ago
- Custom security distro for remote penetration testing☆55Updated 4 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Updated 3 years ago
- Accompanying documentation, images, source code and other stuff from the cybernomad.online blog☆28Updated 4 years ago
- Penetration Testing/Security Cheatsheets☆61Updated 9 years ago
- A curated list of awesome infosec resources.☆29Updated 10 years ago
- OSINT tool for testing privacy and social engineering vulnerability of organizations.☆94Updated 6 years ago
- A few transforms and a machine for parsing Nmap XML results☆38Updated 9 years ago
- A collection of scripts that pull Open Source Information from the web. Eventually the goal is to put this into a large modular style dat…☆56Updated 10 years ago
- Plugins for the King Phisher open source phishing campaign toolkit.☆83Updated 4 years ago
- devops scripts☆33Updated 8 years ago
- This repo is dedicated to all my tricks, tweaks and modules for testing and hunting threats. This repo contains multiple directories whic…☆56Updated 7 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆31Updated last month
- Use Tor for anonymous scanning with nmap☆84Updated 10 years ago
- Hand list of Powershell commands frequently used during penetration tests☆14Updated 6 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Updated 8 years ago
- A single repository for any security tools, scripts, documentation, etc. that I add☆12Updated 8 years ago
- Squatm3gator is a complete web solution based on the python tool squatm3, designed to enumerate available domains generated modifying the…☆34Updated last month
- General stuff for pentesting - password cracking, phishing, automation, Kali, etc.☆82Updated 5 years ago
- recon-ng Maltego local transform pack☆40Updated 11 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Updated 4 years ago
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)☆46Updated 4 years ago