jivoi / devops_4_hackersLinks
DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)
☆15Updated 4 years ago
Alternatives and similar repositories for devops_4_hackers
Users that are interested in devops_4_hackers are comparing it to the libraries listed below
Sorting:
- ☆22Updated 9 years ago
- CyberSec Resources: FRAMEWORKS & STANDARDS; Pentesting Audits & Hacking; PURPLE TEAMING, AD, API, web, clouds, CTF, OSINT, Pentest tools,…☆28Updated 2 years ago
- DirDar is a tool that searches for (403-Forbidden) directories to break it and get dir listing on it☆12Updated 4 years ago
- Searches online paste sites for certain search terms which can indicate a possible data breach.☆75Updated 4 years ago
- ☆10Updated 3 years ago
- Find open databases - Powered by Binaryedge.io☆15Updated 5 years ago
- Miscellaneous tools for BloodHound☆18Updated 3 years ago
- Amassing wealth in the form of biochemical tactical nuclear hack precision strike notes for existential fulfillment and destruction of th…☆12Updated 3 years ago
- Fast subdomains enumeration tool for penetration testers☆14Updated 5 years ago
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆31Updated 2 years ago
- gitbook of all pentesting knowledge☆21Updated 2 years ago
- The hacker technical cheat sheet☆43Updated 4 months ago
- Fuzz for hidden proxies, vhosts, and URLs☆15Updated 4 years ago
- Hackfruit is an easy search tool that finds hacking tools, commands and cheat sheets. It helps cybersecurity learing and trainings, CTFs,…☆23Updated 2 years ago
- An automated e-mail OSINT tool☆24Updated 3 years ago
- Various Cheat Sheets (e.g. Nmap, Metasploit, Common Ports, Subnetting, Wireshark, etc)☆53Updated 5 years ago
- A forensic analysis framework for enumerating slack artifacts residing in the Operating system.☆17Updated last month
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆15Updated 2 years ago
- Bypass 4xx HTTP response status codes and more. Based on PycURL.☆16Updated 3 years ago
- buffer overflow examples☆22Updated 7 years ago
- Hacking, pen-testing, and cyber-security related tools built with Python.☆36Updated 5 years ago
- Bash Recon Scan - Recon and Scan a network using Bash☆30Updated 3 years ago
- crawl a website for links and expose all the vulnerable parameters.☆13Updated 3 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆33Updated 3 years ago
- Install popular tools used while pentesting & playing labs☆13Updated 4 years ago
- Full Valid Fake Data Generator☆102Updated last year
- A tool designed to analyse email headers☆38Updated 3 years ago
- gitGraber: monitor GitHub to search and find sensitive data in real time for different online services such as: Google, Amazon, Paypal, G…☆14Updated 6 years ago
- Intelligence and Reconnaissance Package/Bundle installer.☆28Updated 5 years ago
- a drop-in replacement for Nmap powered by shodan.io☆10Updated 3 years ago