Reporting Tips for Penetration Testers
☆31Jun 9, 2021Updated 4 years ago
Alternatives and similar repositories for iheartreporting
Users that are interested in iheartreporting are comparing it to the libraries listed below
Sorting:
- List of special metadata IPs used in cloud services☆11Aug 9, 2019Updated 6 years ago
- ☆17Jan 20, 2021Updated 5 years ago
- Takes a list of domains as the input, checks if they have a security.txt, outputs the results.☆16May 15, 2020Updated 5 years ago
- ☆22May 8, 2023Updated 2 years ago
- An improvement over the original Mimikatz wrapper.☆19Aug 11, 2021Updated 4 years ago
- 🕵🏻📡👁🔍Analyzes all Open Wireless Networks for detect fake access points (Fingerprint)☆16Aug 13, 2018Updated 7 years ago
- cracke-dit ("Cracked It") makes it easier to perform regular password audits against Active Directory environments.☆113Feb 28, 2025Updated last year
- Python script for automating the download of nessus reports☆27Aug 3, 2022Updated 3 years ago
- 🍓 🤥🍍If threats like wifi pineapple attacks or karma attacks are active around, users will be informed about these threats. Like proxy☆24Jun 18, 2018Updated 7 years ago
- WStalker: an easy proxy☆25May 5, 2020Updated 5 years ago
- DeltaV™ Edge Environment provides easy and secure access to DeltaV data for use on premise or in the cloud for monitoring, analytics, rep…☆11Nov 24, 2025Updated 3 months ago
- Security Descriptor Definition Language (SDDL) Parser☆38Sep 24, 2025Updated 5 months ago
- ☆17Jul 13, 2016Updated 9 years ago
- ESPHome component for reading/writing information to Broan ERVs via serial☆25Jan 8, 2026Updated last month
- Some Powershell scripts developed during my security consulting work. Hopefully they are useful to you too!☆13Apr 19, 2020Updated 5 years ago
- BH Cypher Queries picked up from random places☆41Dec 12, 2018Updated 7 years ago
- Lists of Dynamic DNS Domains/FQDNs as well as lists of services/providers that offer free dynamic dns domains.☆13Nov 2, 2021Updated 4 years ago
- Red Team Assessment Platform - reporting, visualizations, and analytics for cybersecurity red teams☆34Jan 27, 2026Updated last month
- Cura 5.x plugin for including thumbnail/preview images in gcode files for Elegoo Neptune 3 Pro, Plus and Max.☆13May 12, 2023Updated 2 years ago
- a CLI for ephemeral penetration testing☆16Dec 10, 2019Updated 6 years ago
- A tool to evaluate the password health of Active Directory accounts.☆43Nov 19, 2024Updated last year
- Social Engineering for the Blue Team☆11Feb 1, 2024Updated 2 years ago
- ☆12Aug 8, 2024Updated last year
- A Portable Executable parser for Golang☆48Nov 7, 2025Updated 3 months ago
- Bulk scanning of Hosts and IPs using the Shodan API☆10Apr 26, 2022Updated 3 years ago
- Python scripts to control and read status of Yamaha SR-C20A soundbar with web and MQTT interfaces.☆10Jan 29, 2026Updated last month
- Code samples discussed during DEFCON Red Team Village Talk -- "Yippee-Ki-Yay MFA'er - Bypassing Multi-Factor Authentication with Real-Tim…☆10Jul 29, 2020Updated 5 years ago
- ☆14Mar 31, 2015Updated 10 years ago
- Writeups for Google CTF challenges 2017☆10Jun 19, 2017Updated 8 years ago
- Detect the possible hash-types corresponding to a string, right from your terminal.☆11Jan 5, 2023Updated 3 years ago
- My latest setup configs.☆10Aug 7, 2016Updated 9 years ago
- Summation of the OWASP Testing Guide for reference☆10Jun 19, 2017Updated 8 years ago
- a tool that compiles a csv of all h1 program stats☆49Jul 2, 2023Updated 2 years ago
- Zac's assorted config files☆10Jan 11, 2017Updated 9 years ago
- Automate scans using Qualys SSL Labs☆19Mar 10, 2020Updated 5 years ago
- ☆11Oct 15, 2024Updated last year
- ☆11Jul 16, 2018Updated 7 years ago
- Azure Security Lab Workshop☆44Jun 21, 2018Updated 7 years ago
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆51Dec 8, 2022Updated 3 years ago