hackedbyagirl / Offensive-Security-VaultLinks
Offensive Security Vault structure for Obsidian
☆23Updated 2 years ago
Alternatives and similar repositories for Offensive-Security-Vault
Users that are interested in Offensive-Security-Vault are comparing it to the libraries listed below
Sorting:
- List of sources for cybersecurity news☆39Updated 2 years ago
- Sophisticated cyber penetration attacks is a series of advanced techniques, notes and guidance that will help you to prepare in your car…☆33Updated last month
- DorkTerm is a terminal-themed web-based security tool designed to assist security researchers in performing Google Dork queries efficient…☆13Updated 7 months ago
- A simple pentest container equipped with common python pentest tools.☆42Updated 2 weeks ago
- Red Team Templates For Obsidian.md☆32Updated 3 years ago
- Internal Network Penetration Test Playbook☆20Updated 4 years ago
- Terminal based fake identity generator.☆25Updated 2 years ago
- List of GREP modifications and alternatives for a variety of purposes☆132Updated 9 months ago
- Seekolver is a tool focused on attack-surface mapping. It performs searches for subdomains associated with root domains and root domains …☆40Updated last year
- CyberSec Resources: FRAMEWORKS & STANDARDS; Pentesting Audits & Hacking; PURPLE TEAMING, AD, API, web, clouds, CTF, OSINT, Pentest tools,…☆28Updated 2 years ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆39Updated 2 years ago
- Enumeration & fingerprint tool☆24Updated last year
- A learning and testing environment for web application hacking and pentesting.☆27Updated 4 years ago
- OSINT mapping using Twitter, Ficklr, Shodan and Insecam☆23Updated 2 years ago
- Notes for red teamers - from cloud to Active Directory to many things in between.☆59Updated last year
- Arescan is a powerful web directory discovery tool that helps you uncover hidden directories and links on any website. By performing a br…☆31Updated 2 years ago
- [BASH] Bounty Meter is a command-line utility tool designed for bug bounty hunters to define their bounty target for a year, maintain and…☆33Updated 2 years ago
- Several scripts are based on the Netlas.io search engine. They will allow you to carry out the reconnaissance phase before the pen test i…☆44Updated 6 months ago
- Handy scripts and one-liners to make life easier☆37Updated 2 years ago
- Hacker calendar 2024 in high resolution + template + some editing tips☆23Updated last year
- ☆26Updated 2 months ago
- A summary of the most abbreviations I encountered so far☆27Updated last week
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆41Updated 2 years ago
- I provide educational resources in this repository for starting bug hunting from scratch. The content will be updated over time! Also, I …☆33Updated 2 years ago
- 👽 The collection of awesome software, tools, libraries, documents, books, resources and cool stuff about information security, penetrati…☆26Updated 2 months ago
- Simple username generator based on a list of name and surname☆13Updated 4 years ago
- HydrAttack PoC eMail Spoofer Module is designed to test the security posture of a domain against email spoofing attacks. It performs step…☆27Updated 4 months ago
- Collection of my talks and workshops about hacking & cybersecurity☆28Updated 9 months ago
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆29Updated last year
- Elevate your bookmarking game with my latest Bookmark Toolkit. Engineered for ethical bookmarking and enhanced web exploration, it delive…☆44Updated 7 months ago