maldevel / trainingLinks
Notes on offensive training
☆16Updated 7 years ago
Alternatives and similar repositories for training
Users that are interested in training are comparing it to the libraries listed below
Sorting:
- Software exploitation training material☆16Updated 8 years ago
- DPE - Default Password Enumeration☆36Updated 12 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆51Updated 7 years ago
- ☆26Updated 5 years ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆13Updated 4 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- Various exploits☆10Updated 8 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆37Updated 7 years ago
- Use Tor for anonymous scanning with nmap☆85Updated 10 years ago
- A single repository for any security tools, scripts, documentation, etc. that I add☆12Updated 8 years ago
- Unofficial WhatCMS API package☆41Updated 4 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆53Updated 5 years ago
- Scrapes Router Passwords From http://www.routerpasswords.com ,more then +300 product☆46Updated 7 years ago
- Intelligent threat hunter and phishing servers☆48Updated 6 years ago
- [DEPRECATED] Kadabra is my automatic LFI Exploiter and Scanner, written in C++ and a couple extern module in Python.☆35Updated 6 years ago
- Automated script to search in SMB protocol for availables pipe names☆23Updated 7 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆40Updated 10 years ago
- PHP Phishing Framework☆28Updated 11 years ago
- Hasher is designed to be a tool that allows you to quickly hash plaintext strings, or compare hashed values with a plaintext locally. Not…☆52Updated 3 years ago
- Slap the hell outta GitHub by harvesting emails by crunching through commits. The Dope OSINT tool.☆13Updated 7 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Updated 11 years ago
- only for 31337☆23Updated 8 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Updated 5 years ago
- Hunt and Analyze Tor Onion Sites☆23Updated 2 years ago
- Search the ExploitDB with a little more control☆22Updated 8 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 4 years ago
- python tools to assist in penetration testing☆15Updated 3 months ago
- Get clients and access points.☆49Updated 6 years ago
- Passive recon / OSINT automation script☆39Updated 6 years ago
- Collection of single use scripts I worte for windows forensics☆27Updated 13 years ago