edoardottt / MSc-CyberSecurity-SapienzaLinks
Master of Science in Cybersecurity, Sapienza University of Rome.
☆53Updated last year
Alternatives and similar repositories for MSc-CyberSecurity-Sapienza
Users that are interested in MSc-CyberSecurity-Sapienza are comparing it to the libraries listed below
Sorting:
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆35Updated 2 weeks ago
- web application pentesting tools for docker☆18Updated 3 years ago
- Small python script to look for common vulnerabilities on SMTP server.☆51Updated last year
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆40Updated 3 years ago
- Extendable Python script handler for automating penetration testing.☆40Updated 2 years ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆23Updated last year
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆18Updated 3 years ago
- Red Teaming Tactics and Techniques☆13Updated 3 years ago
- Deepsearch leak database client, as an alternative for pwndb☆15Updated 2 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Updated 3 years ago
- Search Google Dorks like Chad. / Broken link hijacking tool.☆30Updated last month
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆35Updated 4 years ago
- ☆13Updated 8 months ago
- List of sources for cybersecurity news☆39Updated 2 years ago
- Collection of offensive tools targeting Microsoft Azure☆10Updated 3 years ago
- Proof of concept denial of service over TOR stress test tool☆41Updated 7 years ago
- Resource Dump For Learning Cybersec-related Concepts☆25Updated 5 years ago
- This tool is useful in case you want to evade the detection based on simple rules when trying to dump the SAM, SYSTEM or SECURITY hives u…☆10Updated 3 years ago
- Payloads and Lists☆22Updated 5 years ago
- Subdomain crawler with wordlist using python☆12Updated 5 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆18Updated 4 years ago
- Enumeration & fingerprint tool☆24Updated last year
- Another vulnerability scanner☆19Updated 3 months ago
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆32Updated 3 weeks ago
- Simple FREE guide to set up TOR stealth and persistence with complete anonymity.☆63Updated 3 years ago
- When I'm doing my job I'm trying to set my working place as efficient and useful as it's possible. Bash terminal is my main everyday prog…☆10Updated 2 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- Script to facilitate different functions and checks☆45Updated 3 years ago
- Simple API for storing all incoming XSS requests and various XSS templates.☆48Updated last year
- PoC Dumb Ransomware payload. Any malicious use of this code is strictly prohibited.☆28Updated 4 months ago