jivoi / ansible-pentest-with-torView external linksLinks
Use Tor for anonymous scanning with nmap
☆92Jun 19, 2015Updated 10 years ago
Alternatives and similar repositories for ansible-pentest-with-tor
Users that are interested in ansible-pentest-with-tor are comparing it to the libraries listed below
Sorting:
- openvpn server configs☆14May 12, 2016Updated 9 years ago
- openVAS with ansible☆21Apr 22, 2015Updated 10 years ago
- Socks5 proxy server by golang☆11Oct 10, 2019Updated 6 years ago
- devops scripts☆33Dec 8, 2016Updated 9 years ago
- home! sweet home☆25Aug 23, 2019Updated 6 years ago
- just for fun ¯\_(ツ)_/¯☆277Sep 21, 2016Updated 9 years ago
- buffer overflow examples☆23Dec 20, 2017Updated 8 years ago
- Penetration Testing/Security Cheatsheets☆64Oct 31, 2015Updated 10 years ago
- Collection of linux sysadmin/devop interview questions☆18Aug 21, 2015Updated 10 years ago
- your offsec knowledge☆481Oct 9, 2019Updated 6 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 7 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Aug 19, 2015Updated 10 years ago
- Powershell-based Windows Security Auditing Toolbox☆10Aug 28, 2017Updated 8 years ago
- only for 31337☆24Nov 19, 2016Updated 9 years ago
- Scripts for Deploying new server☆49Apr 26, 2025Updated 9 months ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆12Jul 2, 2021Updated 4 years ago
- site source jivoi.github.io☆22Nov 7, 2022Updated 3 years ago
- offsec batteries included☆1,593Mar 11, 2024Updated last year
- A curated list of awesome infosec resources.☆32May 31, 2015Updated 10 years ago
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆36Jul 22, 2021Updated 4 years ago
- Software exploitation training material☆16Jun 8, 2017Updated 8 years ago
- Ease-of-use extension for Web Application penetration testing☆18Jun 20, 2017Updated 8 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆35Dec 23, 2020Updated 5 years ago
- Create Cobalt Strike malleable C2 profiles with HTTPS configs☆18May 23, 2020Updated 5 years ago
- Custom pentesting tools☆26Nov 17, 2020Updated 5 years ago
- DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)☆17Aug 2, 2021Updated 4 years ago
- MS15-076 Privilege Escalation☆16Aug 11, 2015Updated 10 years ago
- A C# Tool to find left over pentest data for use in your pentest or redteam op. Blue could maybe use to find files to cleanup☆38Sep 14, 2023Updated 2 years ago
- One line PS scripts that may come handy during your network assesment☆79Mar 8, 2020Updated 5 years ago
- Cisco Unfied Call Manager enumeration☆25Jul 13, 2022Updated 3 years ago
- PowerShell module to play with Kerberos S4U extensions☆52Apr 2, 2017Updated 8 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆109Sep 26, 2017Updated 8 years ago
- SWF Vulnerability & Information Scanner☆17Nov 24, 2018Updated 7 years ago
- Collection of single use scripts I worte for windows forensics☆27Feb 1, 2012Updated 14 years ago
- ☆43Sep 2, 2016Updated 9 years ago
- ☆54Sep 10, 2016Updated 9 years ago
- Custom stagers with python encrypting proxy☆40May 25, 2015Updated 10 years ago
- Compiling a list of free learning resources in different areas of tech☆13Jul 19, 2023Updated 2 years ago
- Physics library for simulating particles☆15Jun 11, 2025Updated 8 months ago