ethanolivertroy / hackspacecon-2023
Workshop & Talk Slide Decks from HackSpaceCon
☆25Updated 11 months ago
Alternatives and similar repositories for hackspacecon-2023
Users that are interested in hackspacecon-2023 are comparing it to the libraries listed below
Sorting:
- ☆55Updated last year
- Script to read input from stdin and encode it☆19Updated last year
- NetScan CLI is a command-line tool for retrieving and analyzing IP address information. It provides detailed subnet and organization data…☆59Updated 8 months ago
- ☆26Updated 2 years ago
- ☆46Updated 2 months ago
- ☆18Updated 2 years ago
- This tool automates the process of running FFUF (Fuzz Faster U Fool) and post-processing its results to extract valid URLs. It supports b…☆34Updated 6 months ago
- This repository has workflows created for https://github.com/RikunjSindhwad/Task-Ninja☆24Updated 9 months ago
- [BASH] Bounty Meter is a command-line utility tool designed for bug bounty hunters to define their bounty target for a year, maintain and…☆33Updated last year
- A structured red-team prompt for generating ethical hacking tools using AI - designed for use in labs, CTFs, and authorized security asse…☆13Updated last month
- Various AD tools needed for penetration testing in one place.☆24Updated last year
- Azure Service Subdomain Enumeration☆59Updated 8 months ago
- A standalone collection of widely used technologies with default credentials enabled, which can be utilized for establishing an initial f…☆18Updated 11 months ago
- List of MurmurHash3 favicon hashes of widely used technologies by vendor to search with Shodan.☆24Updated last year
- DomainTrail is a fast subdomain enumeration tool that uses effective passive and active techniques.☆40Updated last year
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆22Updated 5 months ago
- Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit☆96Updated last month
- Automate Scoping, OSINT and Recon assessments.☆95Updated 3 months ago
- ☆30Updated 3 weeks ago
- Tools used for Pentesting☆22Updated 2 years ago
- LDAP Enumeration Tool for Pentesters☆43Updated 3 weeks ago
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆29Updated last month
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find ent…☆122Updated 2 years ago
- ☆12Updated 3 years ago
- TruffleHog Explorer, a user-friendly web-based tool to visualize and analyze data extracted using TruffleHog.☆38Updated 3 months ago
- ☆26Updated 8 months ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- An advanced JWT extraction & decoding tool for bug bounty hunters! 🏴☠️☆41Updated last month
- A modular external attack surface mapping tool integrating tools for automated reconnaissance and bug bounty workflows.☆35Updated last month
- A New Approach to Directory Bruteforce with WaybackLister v1.0☆75Updated last week