jivoi / devops_4_hackersLinks
DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)
☆17Updated 4 years ago
Alternatives and similar repositories for devops_4_hackers
Users that are interested in devops_4_hackers are comparing it to the libraries listed below
Sorting:
- ☆22Updated 9 years ago
- ☆10Updated 3 years ago
- Searches online paste sites for certain search terms which can indicate a possible data breach.☆75Updated 4 years ago
- Install popular tools used while pentesting & playing labs☆13Updated 4 years ago
- Socks5 proxy server by golang☆11Updated 6 years ago
- CyberSec Resources: FRAMEWORKS & STANDARDS; Pentesting Audits & Hacking; PURPLE TEAMING, AD, API, web, clouds, CTF, OSINT, Pentest tools,…☆30Updated 2 years ago
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆16Updated 2 years ago
- Miscellaneous tools for BloodHound☆18Updated 4 years ago
- DirDar is a tool that searches for (403-Forbidden) directories to break it and get dir listing on it☆13Updated 4 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆38Updated 3 years ago
- Various Cheat Sheets (e.g. Nmap, Metasploit, Common Ports, Subnetting, Wireshark, etc)☆53Updated 5 years ago
- Collect OSINT from git repositories☆18Updated 4 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆35Updated 5 years ago
- A web front-end for password cracking and analytics☆16Updated 7 years ago
- crawl a website for links and expose all the vulnerable parameters.☆14Updated 3 years ago
- An advanced multithreaded admin panel finder written in python.☆14Updated 5 years ago
- Bash Recon Scan - Recon and Scan a network using Bash☆30Updated 3 years ago
- Hackfruit is an easy search tool that finds hacking tools, commands and cheat sheets. It helps cybersecurity learing and trainings, CTFs,…☆23Updated 3 years ago
- The Last Web Recon Tool You'll Need☆17Updated 5 years ago
- Mobile Pentesting Guide (WIP)☆25Updated 5 years ago
- buffer overflow examples☆23Updated 8 years ago
- Fraud prevention tool☆28Updated 5 years ago
- Find open databases - Powered by Binaryedge.io☆14Updated 6 years ago
- Light Armoured Recon is a python script designed to automate passive recon. It automates execution of TheHarvester, whois, Robtex.com, Bu…☆39Updated 7 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆33Updated 3 years ago
- Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. The…☆11Updated 4 years ago
- Automated network asset, email, and social media profile discovery and cataloguing.☆13Updated 4 years ago
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆148Updated 4 years ago
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆64Updated 4 years ago
- Fuzz for hidden proxies, vhosts, and URLs☆15Updated 4 years ago