jivoi / devops_4_hackersLinks
DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)
☆15Updated 4 years ago
Alternatives and similar repositories for devops_4_hackers
Users that are interested in devops_4_hackers are comparing it to the libraries listed below
Sorting:
- ☆22Updated 9 years ago
- ☆10Updated 3 years ago
- Various Cheat Sheets (e.g. Nmap, Metasploit, Common Ports, Subnetting, Wireshark, etc)☆53Updated 5 years ago
- Install popular tools used while pentesting & playing labs☆13Updated 4 years ago
- CyberSec Resources: FRAMEWORKS & STANDARDS; Pentesting Audits & Hacking; PURPLE TEAMING, AD, API, web, clouds, CTF, OSINT, Pentest tools,…☆28Updated 2 years ago
- DirDar is a tool that searches for (403-Forbidden) directories to break it and get dir listing on it☆12Updated 4 years ago
- buffer overflow examples☆22Updated 7 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆35Updated 4 years ago
- Searches online paste sites for certain search terms which can indicate a possible data breach.☆75Updated 4 years ago
- Fast subdomains enumeration tool for penetration testers☆14Updated 5 years ago
- Find open databases - Powered by Binaryedge.io☆14Updated 5 years ago
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆31Updated 2 years ago
- Bash Recon Scan - Recon and Scan a network using Bash☆30Updated 3 years ago
- Fuzz for hidden proxies, vhosts, and URLs☆15Updated 4 years ago
- gitbook of all pentesting knowledge☆21Updated 2 years ago
- Amassing wealth in the form of biochemical tactical nuclear hack precision strike notes for existential fulfillment and destruction of th…☆11Updated 3 years ago
- Bypass 4xx HTTP response status codes and more. Based on PycURL.☆15Updated 3 years ago
- Miscellaneous tools for BloodHound☆18Updated 3 years ago
- gitGraber: monitor GitHub to search and find sensitive data in real time for different online services such as: Google, Amazon, Paypal, G…☆14Updated 6 years ago
- A forensic analysis framework for enumerating slack artifacts residing in the Operating system.☆17Updated last month
- Intelligence gathering framework☆15Updated 10 years ago
- Internal Network Penetration Test Playbook☆20Updated 4 years ago
- 🕵️♂️ Collect a dossier on a person by username from thousands of sites☆13Updated 2 years ago
- Top password lists generated from leaks collected from different paste sites☆31Updated 2 years ago
- Mobile Pentesting Guide (WIP)☆24Updated 5 years ago
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆63Updated 4 years ago
- Python tool to detect critical information (passwords, usernames, strings connectios, etc) in public repositories. GITHUB Hacking.☆21Updated 3 years ago
- Collection of osint related links original posted by Tr1gger on raidforums.com which Tr1gger had copied from the @i_intelligence handbook☆21Updated 7 years ago
- Who We Are☆20Updated last year
- List of sources for cybersecurity news☆39Updated 2 years ago