frankwxu / UbaltLinks
Forensics Science Education
☆11Updated 4 years ago
Alternatives and similar repositories for Ubalt
Users that are interested in Ubalt are comparing it to the libraries listed below
Sorting:
- Collection of exploits that were verified by an automated system☆13Updated 4 years ago
- New version of the buildkit repository☆9Updated 3 years ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆19Updated 2 years ago
- Create machine images containing the Nessus vulnerability scanner☆13Updated last week
- Email Cyber Hygiene, Trustworthy Email, and HTTPS reports to the appropriate technical or distribution addresses☆13Updated last month
- Orchestrate gatherer, scanner, saver, and trustymail_reporter☆19Updated last month
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆36Updated 4 years ago
- A FREE course that takes you step-by-step through building a custom Automation Ansible Framework from scratch.☆22Updated 4 months ago
- This repository contains a Python client for interfacing with the [crt.sh](https://crt.sh/) website, allowing users to retrieve informati…☆14Updated 10 months ago
- Find exposed credentials using GitHub Actions with TruffleHog Enterprise.☆16Updated 7 months ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆12Updated 7 months ago
- Save scan results to a database☆12Updated this week
- ☆11Updated 4 years ago
- linux c++, fox-toolkit, multi-threaded forensic gui tool☆49Updated 11 months ago
- Hashes of infamous malware☆26Updated 2 years ago
- The VT Augment widget is an official, compliant and recommended way of integrating VirusTotal data in third-party applications.☆35Updated last year
- Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding in…☆25Updated 2 years ago
- IoT Hacking Kit Details☆18Updated 9 months ago
- A collection of attacks metadata that were used in my previous pen-test tools☆17Updated 2 years ago
- A Simple Log4j Indicator of Compromise Linux Detector☆15Updated 3 years ago
- Virtual machines that are set up with a variety of known vulnerabilities.☆15Updated 3 years ago
- personal fork of OSINT tool recon-ng☆18Updated 7 years ago
- TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.☆34Updated 6 years ago
- A repository for maintaining a list of the top domains based on multiple lists☆21Updated 3 years ago
- Computer Network Exploitation (CNE) Field Manual☆13Updated last year
- CISOfy Handbook☆32Updated 8 years ago
- SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types i…☆14Updated 9 years ago
- ☆35Updated 3 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆54Updated 5 months ago
- Automated pshtt, trustymail, and sslyze scanning☆27Updated last week