edoardottt / MSc-CyberSecurity-Sapienza
Master of Science in Cybersecurity, Sapienza University of Rome.
☆47Updated 5 months ago
Alternatives and similar repositories for MSc-CyberSecurity-Sapienza:
Users that are interested in MSc-CyberSecurity-Sapienza are comparing it to the libraries listed below
- Search Google Dorks like Chad. / Broken link hijacking tool.☆27Updated last month
- ShellC0de Generator☆11Updated 3 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆34Updated last week
- A crack 💥 version of Ghostify, that helps you view Instagram stories without a trace (the story owner won't know you saw their story!)☆8Updated 2 years ago
- Payloads and Lists☆21Updated 5 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Updated 3 years ago
- Simple utility to manage multiple ssh☆14Updated 2 years ago
- URL / IP / Email defanging with Javascript. Make IoC harmless.☆29Updated 5 months ago
- A python network scanner using scapy☆23Updated 5 years ago
- 「🚪」The hidden hookless backdoor☆12Updated 4 months ago
- Small python script to look for common vulnerabilities on SMTP server.☆47Updated last year
- Python support package to parse IP and host inputs from network based tooling☆11Updated last year
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆12Updated 3 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆35Updated 4 years ago
- ☆26Updated 2 years ago
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆39Updated 3 years ago
- Perform OSINT on external targets using Shodan☆22Updated last year
- Automate the creation of Backdoors and postexplotation activities☆22Updated 2 years ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆20Updated 3 years ago
- Repository of tools used in my blog☆51Updated last year
- Remove Offensive and Profane Words from Wordlists☆14Updated last year
- Deepsearch leak database client, as an alternative for pwndb☆15Updated 2 years ago
- Brutteforce for stego CTFs☆16Updated 2 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 4 years ago
- Terminal based fake identity generator.☆26Updated last year
- The hacker technical cheat sheet☆37Updated 2 weeks ago
- Bash Recon Scan - Recon and Scan a network using Bash☆29Updated 2 years ago
- RDPloit - A Simple Security Vulnerabilities Checker For Remote Desktop Protocol☆31Updated 4 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Updated 3 years ago