gregmalcolm / wacky-wandas-wicked-weapons-frontendLinks
Simple js based storefront demo
☆19Updated 2 years ago
Alternatives and similar repositories for wacky-wandas-wicked-weapons-frontend
Users that are interested in wacky-wandas-wicked-weapons-frontend are comparing it to the libraries listed below
Sorting:
- Brian's Pentesting and Technical Tips for You☆120Updated last year
- Open-Source PowerShell module to allow online play of Backdoors & Breaches card game devised by Black Hills Information Security☆56Updated 4 years ago
- Purple Teaming Attack & Hunt Lab - Terraform☆161Updated 3 years ago
- Just a repo of random Python scripts to get pentesters started with the Python language on engagements.☆217Updated 5 years ago
- ☆73Updated 2 years ago
- Resources for Building Virtual Machine Labs Live Training. YEET.☆127Updated 6 years ago
- NebulousAD automated credential auditing tool.☆154Updated 5 years ago
- oscp-ctf is a small collection of basic Bash scripts that make life easier and save time whether you are in the OSCP labs, HackThebox or …☆67Updated 6 years ago
- Professionally Evil Web Application Penetration Testing 101☆145Updated 5 years ago
- A port of BHIS's Backdoors & Breaches for playingcards.io☆64Updated 2 years ago
- Proofs of Concept. Just fucking around.☆193Updated 3 years ago
- A detailed guide showing you different ways you can incorporate Python into your workflows around Nmap.☆151Updated 3 years ago
- A Docker container for remote penetration testing.☆141Updated 4 years ago
- Applied Purple Teaming - (ITOCI4hr) - Infrastructure, Threat Optics, and Continuous Improvement - June 6, 2020☆322Updated 4 years ago
- Find and notify users in your Active Directory with weak passwords☆103Updated 4 years ago
- List of Repositories☆102Updated 4 years ago
- Active Directory Lab for Penetration Testing☆52Updated 3 months ago
- Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)☆69Updated 3 years ago
- A collection of my Dockerfiles☆90Updated 2 years ago
- Enumerate valid usernames from Office 365 using ActiveSync, Autodiscover v1, or office.com login page.☆285Updated last year
- Curated list of public penetration test reports released by several consulting firms and academic security groups☆34Updated 8 years ago
- You and the AppleLabs' Incident Response Team have been notified of a potential breach to a Human Resources' workstation. According to th…☆76Updated 3 years ago
- Python template to assist with buffer overflows☆72Updated 6 years ago
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆117Updated last year
- NessusV2 File Parser☆66Updated 3 years ago
- ☆45Updated last year
- GUI tool which enables you to parse nessus scan files from Nessus and Tenable.SC by (C) Tenable, Inc. and exports results to a spreadshee…☆106Updated last month
- Recipes, instructions, ideas related to Hacker BBQ, Hacker Kitchen, and Hacker Baking☆56Updated last year
- Jupyter demo repository for PancakesCon2020☆16Updated 5 years ago
- CONVEX is a group of CTFs that are independently deployable into participant Azure environments.☆139Updated 3 years ago