martinholovsky / Security-BlueprintsLinks
Collection of my Security Blueprints & Guides
☆51Updated 2 weeks ago
Alternatives and similar repositories for Security-Blueprints
Users that are interested in Security-Blueprints are comparing it to the libraries listed below
Sorting:
- A tool for generating detailed, locally-processed reports from iOS backups, supporting encrypted and unencrypted data.☆60Updated 9 months ago
- Mobile Reconnaissance Framework is a powerful, lightweight and platform-independent offensive mobile security tool designed to help hacke…☆70Updated 3 weeks ago
- An intentionally vulnerable Android Application to demonstrate various vulnerabilities that airses in Android Components.☆34Updated 3 months ago
- DorkEye is a Python script for ethical dorking. The goal is to identify unintentionally exposed resources, such as sensitive files, login…☆52Updated 3 weeks ago
- ☆213Updated 11 months ago
- This contains notes and slides for my Objective by the Sea talk☆95Updated last year
- A meta-list of public references to threat actor profiles and APT group datasets.☆67Updated last month
- ☆28Updated 11 months ago
- Capture screenshots of onion services on an onion service.☆70Updated last year
- A short graduate course on cybercrime, cyberespionage, and cyberoperations☆81Updated 2 months ago
- The iOS Buster is a groundbreaking penetration testing tool for iOS, capable of performing both static and dynamic testing. It provides d…☆25Updated last year
- A simple scanner for identifying vulnerable cups-browsed instances on your network☆61Updated 10 months ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- External Playbooks for Public Access☆39Updated 6 months ago
- PEGASUS-NEO is a comprehensive penetration testing framework designed for security professionals and ethical hackers. It combines multipl…☆46Updated 5 months ago
- ☆85Updated last year
- This Python-based GUI application allows you to track the latest security vulnerabilities (CVEs) using the☆39Updated 4 months ago
- Collection of links on bad opsec☆98Updated last year
- Challenge Python☆19Updated 2 years ago
- Top 400 passwords as per HaveIBeenPwned☆22Updated 9 months ago
- ☆54Updated 6 months ago
- The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP syst…☆49Updated 5 months ago
- Curated collection of cybersecurity tools featured in Black Hat Arsenal events.☆42Updated 2 weeks ago
- Shortemall is a Python-based tool that automates the process of scanning hidden content of Short URLs.☆90Updated last year
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆121Updated last year
- All the code snippets from my Secure Code Review series on youtube (youtube.com/@muqsitbaig)!☆21Updated last year
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆147Updated last year
- damn-exploitable-android-app-apk☆40Updated 2 years ago
- ☆46Updated 5 months ago
- RADAR (Rapid Assessment of DNS And Reconnaissance) is an advanced DNS reconnaissance tool designed to identify technologies and services …☆100Updated 3 months ago