jivoi / devops_4_hackersLinks
DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)
☆15Updated 3 years ago
Alternatives and similar repositories for devops_4_hackers
Users that are interested in devops_4_hackers are comparing it to the libraries listed below
Sorting:
- ☆22Updated 9 years ago
- ☆10Updated 3 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆29Updated 3 years ago
- buffer overflow examples☆22Updated 7 years ago
- CyberSec Resources: FRAMEWORKS & STANDARDS; Pentesting Audits & Hacking; PURPLE TEAMING, AD, API, web, clouds, CTF, OSINT, Pentest tools,…☆26Updated 2 years ago
- Repository of tools used in my blog☆51Updated last year
- Dockerfile with advanced configurations for Offensive Docker.☆13Updated 4 years ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7Updated 3 years ago
- Payloads and Lists☆23Updated 5 years ago
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆31Updated last year
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆36Updated 4 years ago
- The Kill-The-Code Python Program provides a robust mechanism for remotely controlling code execution by monitoring a specified URL for a …☆16Updated 11 months ago
- ☆14Updated 4 years ago
- Enumeration & fingerprint tool☆25Updated last year
- ☆33Updated 5 months ago
- Miscellaneous tools for BloodHound☆17Updated 3 years ago
- Just a better dirbuster☆13Updated 2 years ago
- DirDar is a tool that searches for (403-Forbidden) directories to break it and get dir listing on it☆13Updated 4 years ago
- A forensic analysis framework for enumerating slack artifacts residing in the Operating system.☆16Updated 3 years ago
- New Framework Red Team Operations☆18Updated 4 years ago
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆12Updated 5 years ago
- Fuzz for hidden proxies, vhosts, and URLs☆15Updated 4 years ago
- A learning and testing environment for web application hacking and pentesting.☆27Updated 4 years ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the targets with the s…☆17Updated 3 years ago
- a shell script aim to automatically launch 50+ online web scanning tools in the Browsaer against a target domain in a 10 waves☆64Updated 5 years ago
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆32Updated 3 years ago
- Bash Recon Scan - Recon and Scan a network using Bash☆30Updated 3 years ago
- Bypass 4xx HTTP response status codes and more. Based on PycURL.☆15Updated 3 years ago
- home! sweet home☆23Updated 5 years ago
- crawl a website for links and expose all the vulnerable parameters.☆13Updated 2 years ago