exaybachay-ak / SecurityAdviceLinks
Collection of advice to new IT security folks
☆18Updated 7 years ago
Alternatives and similar repositories for SecurityAdvice
Users that are interested in SecurityAdvice are comparing it to the libraries listed below
Sorting:
- Web Sight Docker Deployment☆122Updated 8 years ago
- Get your APT on using social media as a tool for data exfiltration.☆148Updated 3 years ago
- Red team & penetration testing tools to exploit the capabilities of Intel AMT☆260Updated 4 years ago
- A python application designed to remotely dump RAM of a Linux client and create a volatility profile for later analysis on your local hos…☆159Updated 5 years ago
- Brian's Pentesting and Technical Tips for You☆119Updated last year
- Scripts and resources for Red Teaming at CCDC competitions☆103Updated 3 years ago
- Professionally Evil Web Application Penetration Testing 101☆148Updated 5 years ago
- Penetration Testing/Security Cheatsheets☆191Updated 10 years ago
- Python Tool for Host Enumeration☆50Updated 8 years ago
- Simple reverse ICMP shell☆132Updated 11 years ago
- Lair is a reactive attack collaboration framework and web application built with meteor.☆383Updated 5 years ago
- ph0neutria is a malware zoo builder that sources samples straight from the wild. Everything is stored in Viper for ease of access and man…☆302Updated 5 years ago
- ☆26Updated 8 years ago
- A place to collect the different document templates for ROS☆62Updated 7 years ago
- ☆425Updated 8 years ago
- Feed the tool a .nessus file and it will automatically get you MSF shell☆239Updated 3 years ago
- Duct Tape Command and Control!☆96Updated 6 months ago
- ☆283Updated 8 years ago
- A traffic analyzer to evade Empire's communication from Anomaly-Based IDS☆109Updated 7 years ago
- Red Team Field Manual☆72Updated 9 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆164Updated 6 years ago
- ☆93Updated 7 years ago
- A collection of Ansible Playbooks that configure Kali to use Fish & install a number of tools☆164Updated 6 years ago
- ☆138Updated 6 years ago
- Basics of Windows privilege escalation☆134Updated 8 years ago
- penetration testing scripts☆136Updated 6 years ago
- ☆73Updated 8 years ago
- Learnings from OSCP and other random stuff.☆31Updated last year
- Evolving directions on building the best Open Source Forensics VM☆161Updated 7 years ago
- Pypykatz server☆125Updated 6 years ago