jordan-wright / infosec-resources
A List of InfoSec Resources
☆10Updated 10 years ago
Related projects ⓘ
Alternatives and complementary repositories for infosec-resources
- Phishing Toolkit☆19Updated 6 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Updated 8 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 8 years ago
- eSentire additions to the nmap network scanner☆13Updated 8 years ago
- Network Defender Toolkit☆18Updated 11 years ago
- Passive DHCP analyzer with OS fingerprinting on the LAN through DHCP☆13Updated 7 years ago
- My Quick Note of BlackHat 2015 Arsenal☆27Updated 9 years ago
- A Burp Suite extension that starts scanning on requests it sees, and dumps results on standard output☆20Updated 8 years ago
- Simple python script to detect meterpreter running in memory (hopefully)☆9Updated 10 years ago
- Flash crossdomain policy security checker☆25Updated 9 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆31Updated 8 years ago
- Discover potential timestamps within the Windows Registry☆18Updated 10 years ago
- Websocket based egress tester☆20Updated 7 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 10 years ago
- DigitalOcean python tool utilising the API for creating and managing multiple customised droplets.☆10Updated 9 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 9 years ago
- Local privilege escalation scripts and tools☆16Updated 8 years ago
- An active domain name query tool to help keep track of domain name movements...☆15Updated 3 years ago
- NMAP NSE that enumerates VNC authentication types☆14Updated 13 years ago
- Collect hashes password hashes for cracking☆30Updated 11 years ago
- Live-Armor: Building Custom Linux Live Images for Security Sandboxing☆11Updated 9 years ago
- malware-encyclopedias is a set of tools to gather malware names and descriptions☆19Updated 8 years ago
- DEPRECATED! LOOK AT CREDNINJA! A tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a …☆15Updated 8 years ago