martinholovsky / Security-BlueprintsLinks
Collection of my Security Blueprints & Guides
☆50Updated 3 weeks ago
Alternatives and similar repositories for Security-Blueprints
Users that are interested in Security-Blueprints are comparing it to the libraries listed below
Sorting:
- A tool for generating detailed, locally-processed reports from iOS backups, supporting encrypted and unencrypted data.☆59Updated 8 months ago
- DorkEye is a Python script for ethical dorking. The goal is to identify unintentionally exposed resources, such as sensitive files, login…☆47Updated 3 weeks ago
- An intentionally vulnerable Android Application to demonstrate various vulnerabilities that airses in Android Components.☆33Updated 2 months ago
- ☆28Updated 9 months ago
- Real Android malware apps discussed in the book☆37Updated last year
- Mobile Reconnaissance Framework is a powerful, lightweight and platform-independent offensive mobile security tool designed to help hacke…☆66Updated 3 weeks ago
- A collection of Script for Red Team & Incidence Response☆11Updated 2 years ago
- PEGASUS-NEO is a comprehensive penetration testing framework designed for security professionals and ethical hackers. It combines multipl…☆41Updated 3 months ago
- The iOS Buster is a groundbreaking penetration testing tool for iOS, capable of performing both static and dynamic testing. It provides d…☆24Updated last year
- This Python-based GUI application allows you to track the latest security vulnerabilities (CVEs) using the☆39Updated 2 months ago
- Basic brute-force script targeting the standard Keycloak Admin/User Console browser login flow.☆22Updated 2 months ago
- IOCs from zLabs research☆20Updated last week
- Detect code obfuscation through text classification in the detection process.☆45Updated last year
- ☆40Updated 6 months ago
- Hardened your Windows OS against forensics analysis☆21Updated 6 months ago
- This contains notes and slides for my Objective by the Sea talk☆99Updated last year
- A meta-list of public references to threat actor profiles and APT group datasets.☆57Updated last week
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- SprayShark is a modular G-Suite password sprayer with threading!☆45Updated last month
- APK Infrastructure Investigator☆63Updated 2 years ago
- ☆54Updated 5 months ago
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆51Updated 3 months ago
- External Playbooks for Public Access☆39Updated 4 months ago
- Tools used for Pentesting☆22Updated 2 years ago
- Tools and Resources for Physical Security Red Teaming☆32Updated 2 months ago
- 🚀 CSRFShark - a utility for manipulating cross-site request forgery attacks☆34Updated last year
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆27Updated 11 months ago
- Challenge Python☆19Updated 2 years ago
- Enumeration & fingerprint tool☆25Updated last year