edoardottt / MSc-CyberSecurity-SapienzaLinks
Master of Science in Cybersecurity, Sapienza University of Rome.
☆55Updated last year
Alternatives and similar repositories for MSc-CyberSecurity-Sapienza
Users that are interested in MSc-CyberSecurity-Sapienza are comparing it to the libraries listed below
Sorting:
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆35Updated 2 weeks ago
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆40Updated 3 years ago
- Small python script to look for common vulnerabilities on SMTP server.☆49Updated 2 years ago
- web application pentesting tools for docker☆17Updated 3 years ago
- Miscellaneous tools for BloodHound☆18Updated 3 years ago
- List of sources for cybersecurity news☆40Updated 3 years ago
- ☆14Updated 9 months ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Updated 3 years ago
- Proof of concept denial of service over TOR stress test tool☆42Updated 7 years ago
- ARP Spoofing Defender is a project designed to protect local networks from ARP Spoofing attacks. ARP Spoofing Defender provides mechanism…☆23Updated last month
- a drop-in replacement for Nmap powered by shodan.io☆10Updated 3 years ago
- Red Teaming Tactics and Techniques☆13Updated 3 years ago
- Payloads and Lists☆23Updated 5 years ago
- The lazy box is developed for setting up a good testing environment for infosec peoples easily. Mostly this box has all the necessary lib…☆15Updated 3 years ago
- This is automation tool which utilize 2 sub -domain finder and then sort out working sub-domain and finally scan for sub-doamin TAKEOVER.☆11Updated 2 years ago
- Extendable Python script handler for automating penetration testing.☆39Updated 2 years ago
- Another vulnerability scanner☆19Updated 4 months ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆14Updated 4 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆35Updated 5 years ago
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆31Updated 2 years ago
- A forensic analysis framework for enumerating slack artifacts residing in the Operating system.☆19Updated 3 months ago
- Collection of offensive tools targeting Microsoft Azure☆10Updated 3 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 3 years ago
- When I'm doing my job I'm trying to set my working place as efficient and useful as it's possible. Bash terminal is my main everyday prog…☆10Updated 2 years ago
- Resource Dump For Learning Cybersec-related Concepts☆25Updated 5 years ago
- URL / IP / Email defanging with Javascript. Make IoC harmless.☆30Updated last year
- The hacker technical cheat sheet☆43Updated 5 months ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 5 years ago
- An automated e-mail OSINT tool☆23Updated 3 years ago