edoardottt / MSc-CyberSecurity-SapienzaLinks
Master of Science in Cybersecurity, Sapienza University of Rome.
☆52Updated 10 months ago
Alternatives and similar repositories for MSc-CyberSecurity-Sapienza
Users that are interested in MSc-CyberSecurity-Sapienza are comparing it to the libraries listed below
Sorting:
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆34Updated last week
- Scrape Pastebin API to collect daily pastes, setup a wordlist and be alerted by email when you have a match.☆50Updated 7 months ago
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆40Updated 3 years ago
- Resource Dump For Learning Cybersec-related Concepts☆25Updated 5 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Updated 3 years ago
- Miscellaneous tools for BloodHound☆18Updated 3 years ago
- When I'm doing my job I'm trying to set my working place as efficient and useful as it's possible. Bash terminal is my main everyday prog…☆10Updated 2 years ago
- a drop-in replacement for Nmap powered by shodan.io☆10Updated 3 years ago
- List of sources for cybersecurity news☆39Updated 2 years ago
- Payloads and Lists☆23Updated 5 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- Small python script to look for common vulnerabilities on SMTP server.☆50Updated last year
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆37Updated 4 years ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆18Updated 3 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆14Updated 4 years ago
- web application pentesting tools for docker☆18Updated 3 years ago
- The hacker technical cheat sheet☆41Updated 2 months ago
- Hacking, pen-testing, and cyber-security related tools built with Python.☆35Updated 4 years ago
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆32Updated 3 years ago
- Methods for attacking KeePass 2.X databases, including extracting of encryption key material from memory.☆10Updated 3 years ago
- Deepsearch leak database client, as an alternative for pwndb☆15Updated 2 years ago
- Site fast fuzzing with chorme extension.☆24Updated 3 years ago
- https://github.com/yeyintminthuhtut/Awesome-Red-Teaming☆16Updated 3 years ago
- a shell script aim to automatically launch 50+ online web scanning tools in the Browsaer against a target domain in a 10 waves☆64Updated 6 years ago
- Proof of concept denial of service over TOR stress test tool☆41Updated 7 years ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆12Updated 3 years ago
- Collection of offensive tools targeting Microsoft Azure☆11Updated 3 years ago
- ☆13Updated 5 months ago
- Simple FREE guide to set up TOR stealth and persistence with complete anonymity.☆63Updated 3 years ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆23Updated last year