edoardottt / MSc-CyberSecurity-Sapienza
Master of Science in Cybersecurity, Sapienza University of Rome.
☆47Updated 3 months ago
Alternatives and similar repositories for MSc-CyberSecurity-Sapienza:
Users that are interested in MSc-CyberSecurity-Sapienza are comparing it to the libraries listed below
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆32Updated 3 weeks ago
- Search Google Dorks like Chad. / Broken link hijacking tool.☆27Updated last month
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆27Updated 2 years ago
- A crack 💥 version of Ghostify, that helps you view Instagram stories without a trace (the story owner won't know you saw their story!)☆7Updated 2 years ago
- A wacky exploitation framework written in pure python3.☆24Updated 11 months ago
- Found resources in my malware researching adventure.☆16Updated 2 years ago
- A tool to check for response status codes with ease☆14Updated last year
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆12Updated 2 years ago
- URL / IP / Email defanging with Javascript. Make IoC harmless.☆27Updated 3 months ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- Automated encryption utilities and installation☆12Updated 4 years ago
- A python script to check if URLs are allowed or disallowed by a robots.txt file.☆21Updated 2 weeks ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆34Updated 4 years ago
- My personal tech blog☆15Updated 2 months ago
- 「🚪」The hidden hookless backdoor☆12Updated 2 months ago
- Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152☆18Updated 2 years ago
- web application pentesting tools for docker☆17Updated 2 years ago
- hacking tools awesome lists☆14Updated 7 years ago
- A python script file to statically and dynamically investigate and analyse binary files for buffer overflow exploits.☆10Updated 8 months ago
- Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more☆41Updated 3 months ago
- Remove Offensive and Profane Words from Wordlists☆14Updated last year
- Wordpress - Joomla - OpenCart - Drupal CMS Bruter☆12Updated 2 years ago
- List of sources for cybersecurity news☆36Updated 2 years ago
- RDPloit - A Simple Security Vulnerabilities Checker For Remote Desktop Protocol☆31Updated 3 years ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆20Updated 3 years ago
- CATANA - CUT your Wordlist!☆13Updated 2 years ago
- Small python script to look for common vulnerabilities on SMTP server.☆47Updated last year
- Simple utility to manage multiple ssh☆14Updated 2 years ago
- ☆19Updated last year