Use Tor for anonymous scanning with nmap
☆93Jun 19, 2015Updated 10 years ago
Alternatives and similar repositories for ansible-pentest-with-tor
Users that are interested in ansible-pentest-with-tor are comparing it to the libraries listed below
Sorting:
- openvpn server configs☆14May 12, 2016Updated 9 years ago
- openVAS with ansible☆21Apr 22, 2015Updated 10 years ago
- Socks5 proxy server by golang☆11Oct 10, 2019Updated 6 years ago
- devops scripts☆33Dec 8, 2016Updated 9 years ago
- home! sweet home☆25Aug 23, 2019Updated 6 years ago
- just for fun ¯\_(ツ)_/¯☆277Sep 21, 2016Updated 9 years ago
- buffer overflow examples☆23Dec 20, 2017Updated 8 years ago
- Penetration Testing/Security Cheatsheets☆65Oct 31, 2015Updated 10 years ago
- Collection of linux sysadmin/devop interview questions☆18Aug 21, 2015Updated 10 years ago
- intrusion detection☆26Jun 14, 2017Updated 8 years ago
- your offsec knowledge☆484Oct 9, 2019Updated 6 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Aug 19, 2015Updated 10 years ago
- Powershell-based Windows Security Auditing Toolbox☆10Aug 28, 2017Updated 8 years ago
- Local privilege escalation scripts and tools☆17Aug 4, 2016Updated 9 years ago
- only for 31337☆24Nov 19, 2016Updated 9 years ago
- Scripts for Deploying new server☆49Apr 26, 2025Updated 10 months ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆12Jul 2, 2021Updated 4 years ago
- site source jivoi.github.io☆22Nov 7, 2022Updated 3 years ago
- offsec batteries included☆1,601Mar 11, 2024Updated last year
- A curated list of awesome infosec resources.☆32May 31, 2015Updated 10 years ago
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆35Jul 22, 2021Updated 4 years ago
- Software exploitation training material☆16Jun 8, 2017Updated 8 years ago
- Ease-of-use extension for Web Application penetration testing☆18Jun 20, 2017Updated 8 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆36Dec 23, 2020Updated 5 years ago
- Create Cobalt Strike malleable C2 profiles with HTTPS configs☆18May 23, 2020Updated 5 years ago
- Python 3 script for interacting with Shodan API☆20Nov 4, 2024Updated last year
- Custom pentesting tools☆26Nov 17, 2020Updated 5 years ago
- A collection of searches, interesting events and tables on Crowdstrike Splunk.☆30Mar 2, 2021Updated 5 years ago
- DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)☆18Aug 2, 2021Updated 4 years ago
- MS15-076 Privilege Escalation☆16Aug 11, 2015Updated 10 years ago
- A C# Tool to find left over pentest data for use in your pentest or redteam op. Blue could maybe use to find files to cleanup☆37Sep 14, 2023Updated 2 years ago
- One line PS scripts that may come handy during your network assesment☆80Mar 8, 2020Updated 6 years ago
- Cisco Unfied Call Manager enumeration☆24Jul 13, 2022Updated 3 years ago
- PowerShell module to play with Kerberos S4U extensions☆52Apr 2, 2017Updated 8 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆109Sep 26, 2017Updated 8 years ago
- Collection of single use scripts I worte for windows forensics☆27Feb 1, 2012Updated 14 years ago
- SWF Vulnerability & Information Scanner☆18Nov 24, 2018Updated 7 years ago
- ☆43Sep 2, 2016Updated 9 years ago