gregmalcolm / wacky-wandas-wicked-weapons-frontendLinks
Simple js based storefront demo
☆19Updated 3 years ago
Alternatives and similar repositories for wacky-wandas-wicked-weapons-frontend
Users that are interested in wacky-wandas-wicked-weapons-frontend are comparing it to the libraries listed below
Sorting:
- A Docker container for remote penetration testing.☆141Updated 4 years ago
- Brian's Pentesting and Technical Tips for You☆120Updated last year
- Professionally Evil Web Application Penetration Testing 101☆146Updated 5 years ago
- Purple Teaming Attack & Hunt Lab - Terraform☆161Updated 4 years ago
- Proofs of Concept. Just fucking around.☆193Updated 3 years ago
- NebulousAD automated credential auditing tool.☆154Updated 5 years ago
- Just a repo of random Python scripts to get pentesters started with the Python language on engagements.☆218Updated 5 years ago
- Find and notify users in your Active Directory with weak passwords☆103Updated 4 years ago
- Resources for Building Virtual Machine Labs Live Training. YEET.☆127Updated 6 years ago
- oscp-ctf is a small collection of basic Bash scripts that make life easier and save time whether you are in the OSCP labs, HackThebox or …☆66Updated 6 years ago
- CONVEX is a group of CTFs that are independently deployable into participant Azure environments.☆140Updated 3 years ago
- Leverage the ability of Terraform and AWS or GCP to distribute large security scans across numerous cloud instances.☆93Updated 2 years ago
- ☆73Updated 2 years ago
- Search exposed EBS volumes for secrets☆302Updated 2 years ago
- A port of BHIS's Backdoors & Breaches for playingcards.io☆64Updated 2 years ago
- Applied Purple Teaming - (ITOCI4hr) - Infrastructure, Threat Optics, and Continuous Improvement - June 6, 2020☆322Updated 4 years ago
- LinkedIn reconnaissance tool☆55Updated 3 years ago
- Curated list of public penetration test reports released by several consulting firms and academic security groups☆34Updated 8 years ago
- Designed to be installed on a fresh install of raspbian on a raspberry pi, by combining Respounder (Responder detection) and Artillery (p…☆34Updated 6 years ago
- Automatically exported from code.google.com/p/nipper-ng☆72Updated 3 years ago
- A Command-line tool which leverages the Tenable Vulnerability Management API to reduce the time it takes to get information that is commo…☆83Updated 3 weeks ago
- Nessus Parser☆57Updated 8 years ago
- A detailed guide showing you different ways you can incorporate Python into your workflows around Nmap.☆150Updated 4 years ago
- Open-Source PowerShell module to allow online play of Backdoors & Breaches card game devised by Black Hills Information Security☆56Updated 4 years ago
- Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)☆68Updated 3 years ago
- List of Repositories☆103Updated 4 years ago
- Active Directory Lab for Penetration Testing☆52Updated 4 months ago
- Scripts to help work with configuration audit files☆89Updated 2 years ago
- Statically Compiled Tools that could be used in engagements☆17Updated 3 years ago
- ☆45Updated last year