jordan-wright / infosec-resources
A List of InfoSec Resources
☆10Updated 10 years ago
Alternatives and similar repositories for infosec-resources:
Users that are interested in infosec-resources are comparing it to the libraries listed below
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 9 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Updated 9 years ago
- A Burp Suite extension that starts scanning on requests it sees, and dumps results on standard output☆20Updated 8 years ago
- Various pentest scripts☆14Updated 10 years ago
- Phishing Toolkit☆19Updated 6 years ago
- My Quick Note of BlackHat 2015 Arsenal☆27Updated 9 years ago
- Bash scripts to help setup port redirects with iptables☆16Updated 7 years ago
- Flash crossdomain policy security checker☆25Updated 9 years ago
- An active domain name query tool to help keep track of domain name movements...☆15Updated 3 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 8 years ago
- malware-encyclopedias is a set of tools to gather malware names and descriptions☆19Updated 8 years ago
- Cross Distribution Exploit Testing☆27Updated 9 years ago
- Discover potential timestamps within the Windows Registry☆18Updated 10 years ago
- eSentire additions to the nmap network scanner☆13Updated 8 years ago
- Simple python script to detect meterpreter running in memory (hopefully)☆9Updated 10 years ago
- Brisket is a collection of frontend scripts for masscan, zmap, and nmap, in addition data manipulation scripts☆29Updated 10 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Live-Armor: Building Custom Linux Live Images for Security Sandboxing☆11Updated 9 years ago
- Network Defender Toolkit☆18Updated 11 years ago
- Find useful stuff in pastebin☆23Updated 11 years ago
- Passive DHCP analyzer with OS fingerprinting on the LAN through DHCP☆13Updated 7 years ago
- Burp extension for decoding WCF-gzipped requests.☆12Updated 8 years ago
- Collect hashes password hashes for cracking☆31Updated 11 years ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Updated 8 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 10 years ago