jrcarreiro / pwnedlessLinks
Script for applied security baseline controls in RedHat/CentOS.
☆12Updated 8 years ago
Alternatives and similar repositories for pwnedless
Users that are interested in pwnedless are comparing it to the libraries listed below
Sorting:
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- Framework for Automated Security Testing that is Scaleable and Asynchronous built on Microservices☆18Updated 8 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Updated last year
- Public Advisories for Security Vulnerabilities.☆24Updated 10 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Updated 10 years ago
- A collection of scripts made duing my personal research☆29Updated 6 years ago
- Tachikoma is a security alerting framework for human beings☆22Updated 6 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Updated 8 years ago
- A Burp Suite extension that checks if a particular URL responds differently to various User-Agent headers☆16Updated 10 years ago
- Popping boxes with Nmap☆18Updated 13 years ago
- Suite for Information gathering☆12Updated 6 years ago
- thedumpster is a tool which does passive recon using google and its dorks against a particular domain.☆11Updated 10 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 9 years ago
- Data exfiltration PoC scripts☆24Updated 9 years ago
- A configurable OS shell command injection vulnerability testbed☆15Updated 11 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 7 years ago
- miscellaneous scripts and things...☆21Updated 9 years ago
- Social Engineering Abusing Google App Scripts☆24Updated 8 years ago
- Brazilian banker malware identified by Notificacao_Infracao_De_Transito_99827462345231.js☆11Updated 7 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Updated 7 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Updated 7 years ago
- Advanced HTTP fingerprinting PoC☆45Updated 8 years ago
- Automated Security Assessment Reporting Tool☆37Updated 7 years ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆30Updated 6 years ago
- A Scaleable and Asynchronous Framework for Testing Tools built on Kubernetes☆34Updated 8 years ago
- Docker container for datasploit framework☆26Updated 7 years ago
- NMAP NSE that enumerates VNC authentication types☆14Updated 14 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆30Updated 6 years ago
- Ruby script for spoofing SMTP emails.☆43Updated 2 years ago