jivoi / devops_4_hackersLinks
DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)
☆15Updated 4 years ago
Alternatives and similar repositories for devops_4_hackers
Users that are interested in devops_4_hackers are comparing it to the libraries listed below
Sorting:
- ☆22Updated 9 years ago
- ☆10Updated 3 years ago
- CyberSec Resources: FRAMEWORKS & STANDARDS; Pentesting Audits & Hacking; PURPLE TEAMING, AD, API, web, clouds, CTF, OSINT, Pentest tools,…☆28Updated 2 years ago
- Install popular tools used while pentesting & playing labs☆13Updated 4 years ago
- Searches online paste sites for certain search terms which can indicate a possible data breach.☆75Updated 4 years ago
- Miscellaneous tools for BloodHound☆18Updated 3 years ago
- Various Cheat Sheets (e.g. Nmap, Metasploit, Common Ports, Subnetting, Wireshark, etc)☆53Updated 5 years ago
- Fast subdomains enumeration tool for penetration testers☆14Updated 5 years ago
- Portable and flexible web application security assessment tool.It parses Burp Suite log and performs various tests depending on the modul…☆36Updated 10 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆35Updated 4 years ago
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆15Updated 2 years ago
- Payloads and Lists☆22Updated 5 years ago
- Bash Recon Scan - Recon and Scan a network using Bash☆30Updated 3 years ago
- crawl a website for links and expose all the vulnerable parameters.☆13Updated 3 years ago
- Intelligence gathering framework☆15Updated 10 years ago
- Mobile Pentesting Guide (WIP)☆25Updated 5 years ago
- DirDar is a tool that searches for (403-Forbidden) directories to break it and get dir listing on it☆12Updated 4 years ago
- List of sources for cybersecurity news☆39Updated 2 years ago
- Hacking, pen-testing, and cyber-security related tools built with Python.☆36Updated 5 years ago
- gitbook of all pentesting knowledge☆21Updated 2 years ago
- Enumeration & fingerprint tool☆24Updated last year
- buffer overflow examples☆22Updated 7 years ago
- Fuzz for hidden proxies, vhosts, and URLs☆15Updated 4 years ago
- Web Application Vulnerability Exploiter (WAVE) is basically a vulnerability scanner which scans for Secuirity Vulnerabilities in web appl…☆26Updated last month
- Amassing wealth in the form of biochemical tactical nuclear hack precision strike notes for existential fulfillment and destruction of th…☆12Updated 3 years ago
- Top password lists generated from leaks collected from different paste sites☆31Updated 2 years ago
- Repository of tools used in my blog☆52Updated last year
- Facial Recognition and its dangers for Special Forces Operatives☆23Updated 2 years ago
- Find open databases - Powered by Binaryedge.io☆14Updated 5 years ago
- gitGraber: monitor GitHub to search and find sensitive data in real time for different online services such as: Google, Amazon, Paypal, G…☆14Updated 6 years ago