martinholovsky / Security-BlueprintsLinks
Collection of my Security Blueprints & Guides
☆51Updated last month
Alternatives and similar repositories for Security-Blueprints
Users that are interested in Security-Blueprints are comparing it to the libraries listed below
Sorting:
- A tool for generating detailed, locally-processed reports from iOS backups, supporting encrypted and unencrypted data.☆60Updated 10 months ago
- An intentionally vulnerable Android Application to demonstrate various vulnerabilities that airses in Android Components.☆36Updated 4 months ago
- Mobile Reconnaissance Framework is a powerful, lightweight and platform-independent offensive mobile security tool designed to help hacke…☆71Updated last month
- DorkEye is a Python script for ethical dorking. The goal is to identify unintentionally exposed resources, such as sensitive files, login…☆52Updated last month
- ☆215Updated last year
- Tor onion address lookup☆51Updated last week
- A meta-list of public references to threat actor profiles and APT group datasets.☆68Updated 2 months ago
- This contains notes and slides for my Objective by the Sea talk☆95Updated last year
- ☆28Updated 11 months ago
- IOCs from zLabs research☆23Updated this week
- Real Android malware apps discussed in the book☆38Updated last year
- This Python-based GUI application allows you to track the latest security vulnerabilities (CVEs) using the☆39Updated 4 months ago
- All the code snippets from my Secure Code Review series on youtube (youtube.com/@muqsitbaig)!☆22Updated last year
- The iOS Buster is a groundbreaking penetration testing tool for iOS, capable of performing both static and dynamic testing. It provides d…☆25Updated last year
- Capture screenshots of onion services on an onion service.☆71Updated last year
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆147Updated last year
- A short graduate course on cybercrime, cyberespionage, and cyberoperations☆81Updated 3 months ago
- External Playbooks for Public Access☆39Updated 6 months ago
- A collection of Script for Red Team & Incidence Response☆11Updated 3 years ago
- ☆57Updated 6 years ago
- Shortemall is a Python-based tool that automates the process of scanning hidden content of Short URLs.☆90Updated last year
- Run Capture the Flags and Security Trainings with OWASP WrongSecrets☆51Updated this week
- ☆54Updated 7 months ago
- Hi, these are some scripts that i use whenever a mobile pentest task comes up . Hope they would be helpful for someone☆13Updated last year
- Challenge Python☆19Updated 2 years ago
- Top 400 passwords as per HaveIBeenPwned☆22Updated 10 months ago
- ☆124Updated 2 months ago
- Hacking: The Art of Exploitation 2nd Edition, by Jon Erickson☆18Updated 5 years ago
- Internal Network Penetration Test Playbook☆21Updated 4 years ago
- ☆24Updated 6 months ago