mccright / referencesLinks
Collection of reusable references
☆14Updated last month
Alternatives and similar repositories for references
Users that are interested in references are comparing it to the libraries listed below
Sorting:
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Updated 2 years ago
- Maltego transform for visualizing Nessus scan data☆45Updated 6 years ago
- This repository will host resources for collecting information about cloud providers - SaaS, IaaS, PaaS, DaaS etc.☆30Updated 5 years ago
- A systemd-enabled Kali Linux Docker image, in the spirit of geerlingguy/docker-debian11-ansible.☆15Updated last month
- A repository for maintaining a list of the top domains based on multiple lists☆23Updated 3 years ago
- DPE - Default Password Enumeration☆36Updated 12 years ago
- CLI tools using Harpoon features☆24Updated 2 years ago
- list of all the pastebins across all protocols (Tor, ZeroNet, etc.)☆43Updated 6 years ago
- Hardened Windows Server image☆19Updated 6 years ago
- A simple script for translating IP addresses to GeoLocations☆51Updated 3 years ago
- hacker folklore, history, and culture☆13Updated last year
- 🛰A bash script to check if you have a gateway that could get you somewhere nice.☆15Updated 6 years ago
- A Security and Privacy Guide for non-technical users☆45Updated 10 years ago
- Custom Maltego transforms☆67Updated 10 years ago
- Maltego integration of https://abusix.com☆16Updated 7 years ago
- A WikiLeaks scraper inspired by the Datasploit module previously written in Python2. This script leverages pandas and Python3.☆38Updated last year
- Maltego integration of https://haveibeenpwned.com☆61Updated 10 months ago
- ToolsWatch and Black Hat Arsenal selection of badges☆58Updated last year
- Maltego integration of https://clearbit.com☆41Updated 5 years ago
- Takes in scan reports from the GVM PostgreSQL Database and dump into Elasticsearch☆15Updated 2 years ago
- Pythonic interface to the Internet Storm Center / DShield API.☆28Updated 2 years ago
- Open Standard Vulnerability & Compliance Scanner☆46Updated 10 years ago
- Kaseya REvil CNC domains☆12Updated 2 years ago
- Collection of exploits that were verified by an automated system☆13Updated 4 years ago
- A honeypot that can be used to observe traffic directed at home routers.☆20Updated 7 years ago
- Guidelines for writing secure code for Python developers.☆22Updated 8 years ago
- SwaraVM is a mobile security virtual machine that aggregates tools and resources that are commonly used for network traffic analysis, mal…☆32Updated 6 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆35Updated 5 years ago
- Using Ansible as an orchestrator, this project is another solution for testers looking to configure and deploy a new VM or VPS box with t…☆20Updated 8 years ago
- playing around with food and drink sites and OSINT☆15Updated 7 years ago