exaybachay-ak / SecurityAdviceLinks
Collection of advice to new IT security folks
☆18Updated 6 years ago
Alternatives and similar repositories for SecurityAdvice
Users that are interested in SecurityAdvice are comparing it to the libraries listed below
Sorting:
- (extensible) Data Exfiltration Toolkit (DET)☆163Updated 5 years ago
- Red team & penetration testing tools to exploit the capabilities of Intel AMT☆258Updated 4 years ago
- Generate vulnerable virtual machines on the fly (current team development is taking place in the cliffe/SecGen fork)☆317Updated 6 years ago
- ☆283Updated 7 years ago
- A python application designed to remotely dump RAM of a Linux client and create a volatility profile for later analysis on your local hos…☆161Updated 4 years ago
- Get your APT on using social media as a tool for data exfiltration.☆147Updated 2 years ago
- Professionally Evil Web Application Penetration Testing 101☆142Updated 5 years ago
- A collection of tools for dealing with TrickBot☆202Updated 7 years ago
- ph0neutria is a malware zoo builder that sources samples straight from the wild. Everything is stored in Viper for ease of access and man…☆300Updated 5 years ago
- Lair is a reactive attack collaboration framework and web application built with meteor.☆383Updated 5 years ago
- ☆108Updated 8 years ago
- Ephemera and other documentation associated with the 1337list project.☆395Updated 7 years ago
- A list of published research documents☆245Updated last year
- ☆26Updated 7 years ago
- Penetration Testing/Security Cheatsheets☆191Updated 9 years ago
- Brian's Pentesting and Technical Tips for You☆120Updated 11 months ago
- Scripts and resources for Red Teaming at CCDC competitions☆101Updated 2 years ago
- Simple reverse ICMP shell☆133Updated 10 years ago
- A traffic analyzer to evade Empire's communication from Anomaly-Based IDS☆109Updated 6 years ago
- A fully functional DanderSpritz lab in 2 commands☆432Updated 6 years ago
- ☆73Updated 7 years ago
- This tool creates an initial file repository directory tree structure for penetration test reporting/file storage based on single host, l…☆32Updated 8 years ago
- Auto Domain Admin and Network Exploitation.☆299Updated 7 years ago
- Materials of Workshop presented at DEFCON 25☆108Updated 7 years ago
- CTFs, solutions and presentations☆290Updated 2 months ago
- VolatilityBot – An automated memory analyzer for malware samples and memory dumps☆267Updated 4 years ago
- Orc is a post-exploitation framework for Linux written in Bash☆395Updated 5 years ago
- Frontpage and Sharepoint fingerprinting and attack tool.☆284Updated 3 years ago
- Python script to decode common encoded PowerShell scripts☆216Updated 7 years ago
- A collection of Ansible Playbooks that configure Kali to use Fish & install a number of tools☆162Updated 5 years ago