edoardottt / MSc-CyberSecurity-Sapienza
Master of Science in Cybersecurity, Sapienza University of Rome.
☆42Updated 9 months ago
Related projects: ⓘ
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆25Updated 2 years ago
- ☆26Updated this week
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆27Updated last month
- List of sources for cybersecurity news☆32Updated last year
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆30Updated 3 years ago
- The hacker technical cheat sheet☆29Updated this week
- Hack Windows with FUD backdoor/payload, Escalates LINUX privileges, Devastate Linux, Tunnel forwarding☆12Updated 3 years ago
- Enumeration & fingerprint tool☆23Updated 6 months ago
- Search Google Dorks like Chad. / Social media takeover tool.☆24Updated 2 months ago
- Computer Network Exploitation (CNE) Field Manual☆13Updated 5 months ago
- RDPloit - A Simple Security Vulnerabilities Checker For Remote Desktop Protocol☆32Updated 3 years ago
- A python script to check if URLs are allowed or disallowed by a robots.txt file.☆21Updated 2 years ago
- Apache (Linux) CVE-2021-41773/2021-42013 Mass Vulnerability Checker☆21Updated 2 years ago
- Ransomware for demonstration☆14Updated last year
- Remove Offensive and Profane Words from Wordlists☆13Updated last year
- Repository of tools used in my blog☆48Updated 5 months ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆11Updated 2 years ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7Updated 2 years ago
- URL / IP / Email defanging with Javascript. Make IoC harmless.☆25Updated 9 months ago
- All Shell In One. Generate Reverse Shells and/or generate single code that runs all the payloads.☆11Updated 3 years ago
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆27Updated 11 months ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆20Updated 3 years ago
- Shell hunter for AF☆34Updated 2 years ago
- Methods for attacking KeePass 2.X databases, including extracting of encryption key material from memory.☆10Updated 2 years ago
- Payloads and Lists☆19Updated 4 years ago
- web application pentesting tools for docker☆17Updated 2 years ago
- Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more☆33Updated 8 months ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆10Updated last year
- Personal Collection of Awesome Google Dorks☆29Updated 5 years ago
- A tool to check for response status codes with ease☆14Updated last year
- Burpsuite Plugin to bypass strict RePlay protection☆12Updated 3 years ago