mirak-kimko / VulnerabilitySearcherLinks
This tool will help you to find CVEs, exploits, or possible 0-Days for a specific technology.
☆14Updated last year
Alternatives and similar repositories for VulnerabilitySearcher
Users that are interested in VulnerabilitySearcher are comparing it to the libraries listed below
Sorting:
- A curated checklist of tasks to be done during engagements☆32Updated 11 months ago
- A list of OSINT Resources☆46Updated 2 years ago
- Slides for my conference talks☆44Updated 2 years ago
- Ethical Hacking Toolkit is a collection of tools, cheat sheets, and resources for Ethical hackers, Penetration Tester, and Security Resea…☆121Updated 3 years ago
- Tools & Resources for Cyber Security Operations☆242Updated 2 months ago
- This repository contains a curated list of websites and repositories featuring pentest & red-team resources such as cheatsheets, write-up…☆65Updated last week
- Collection of penetration test reports and pentest report templates. Published by the the best security companies in the world.☆261Updated last week
- A curated list of tools and resources that I use daily as a Purple-Team operator.☆82Updated 2 months ago
- Short checklists for penetration testing methodology☆191Updated last year
- An in-depth guide to help people who are new to penetration testing or red teaming and are looking to gain an overview of the penetration…☆141Updated 7 months ago
- Postman OSINT tool to extract creds, token, username, email & more from Postman Public Workspaces☆164Updated 3 months ago
- All of my threat intel recommendations for aspiring Information Security Analyst. This section contains information about evidence at ana…☆46Updated 4 months ago
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆138Updated 2 years ago
- An inventory of tools and resources about CyberSecurity that aims to help people to find everything related to CyberSecurity.☆306Updated this week
- Learning resources, blogs, news, SQL, PowerShell, SQL, Linux, Revers Engineering, Malware☆31Updated last week
- OSINT mapping using Twitter, Ficklr, Shodan and Insecam☆22Updated 2 years ago
- Repository with some necessary information for you to create your PenTest consultancy☆98Updated 6 months ago
- A curated list of amazingly awesome OSINT☆35Updated 8 years ago
- ☆99Updated 3 years ago
- list of useful commands, shells and notes related to OSCP☆26Updated 7 years ago
- This OSINT Notebook provides an overview of the tools, techniques, and resources that I use for a variety of situations when it comes to …☆353Updated 11 months ago
- ☆136Updated 2 years ago
- A compiled list of tools for reconnaissance and footprinting☆135Updated 11 months ago
- ☆102Updated 2 months ago
- Includes quick start guides for Shodan for both IT and ICS/OT assets☆131Updated last year
- Legion is an open source, easy-to-use, super-extensible and semi-automated network penetration testing tool that aids in discovery, recon…☆37Updated last month
- PwnPad is an affordable, hands-on hardware hacking platform built for practical learning. It features a range of challenges that walk use…☆107Updated last month
- Google Dork File Finder☆197Updated 7 months ago
- A wordlist generator tool, that allows you to supply a set of words, giving you the possibility to craft multiple variations from the giv…☆95Updated last year
- Generate email permutations from a name and verify if this email exist with different providers (gmail, duckduckgo, yahoo, yandex)☆41Updated 5 months ago