edoardottt / MSc-CyberSecurity-Sapienza
Master of Science in Cybersecurity, Sapienza University of Rome.
☆46Updated 2 months ago
Alternatives and similar repositories for MSc-CyberSecurity-Sapienza:
Users that are interested in MSc-CyberSecurity-Sapienza are comparing it to the libraries listed below
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆33Updated 4 years ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆32Updated 2 weeks ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- Python support package to parse IP and host inputs from network based tooling☆11Updated last year
- Central IoC scanner based on Loki☆20Updated 3 years ago
- A python script file to statically and dynamically investigate and analyse binary files for buffer overflow exploits.☆10Updated 7 months ago
- Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152☆18Updated 2 years ago
- Bash Script with 4 ways to get persistence in Linux systems WITHOUT root permisions☆13Updated 2 years ago
- 「🚪」The hidden hookless backdoor☆12Updated last month
- A python network scanner using scapy☆22Updated 4 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆13Updated 3 years ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆11Updated 2 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆27Updated 2 years ago
- Collection of offensive tools targeting Microsoft Azure☆11Updated 2 years ago
- Automate the creation of Backdoors and postexplotation activities☆22Updated 2 years ago
- Repo for all the Recon and enum techniques, Exploitation, Priv-escalation (Linux and Windows), post exploitation☆16Updated 4 years ago
- Passive Reconnaissance Techniques Approach helps for penetration testing and bug bounty hunting by gathering information about a target s…☆12Updated last year
- Subdomain crawler with wordlist using python☆12Updated 4 years ago
- Payloads and Lists☆20Updated 4 years ago
- BurpDroid is a web application debugging tool for Android and is often used for checking web application security. It’s a proxy-based too…☆10Updated 3 years ago
- Simple utility to manage multiple ssh☆14Updated 2 years ago
- web application pentesting tools for docker☆17Updated 2 years ago
- A crack 💥 version of Ghostify, that helps you view Instagram stories without a trace (the story owner won't know you saw their story!)☆7Updated last year
- Dockerfile with advanced configurations for Offensive Docker.☆13Updated 4 years ago
- Terminal based fake identity generator.☆26Updated last year
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Updated 2 years ago
- Search Google Dorks like Chad. / Broken link hijacking tool.☆27Updated 3 weeks ago
- A Simple Log4j Indicator of Compromise Linux Detector☆14Updated 3 years ago
- The lazy box is developed for setting up a good testing environment for infosec peoples easily. Mostly this box has all the necessary lib…☆14Updated 2 years ago