murchie85 / cyber_compendiumLinks
A one stop shop for all cyber tooling, frameworks and hacking methodologies
☆11Updated 4 years ago
Alternatives and similar repositories for cyber_compendium
Users that are interested in cyber_compendium are comparing it to the libraries listed below
Sorting:
- SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types i…☆14Updated 9 years ago
- ☆12Updated 4 years ago
- Notes and Commands for CTFs☆23Updated 5 years ago
- Red Team Tool Kit☆16Updated 6 years ago
- ☆33Updated 6 months ago
- Fuzz for hidden proxies, vhosts, and URLs☆15Updated 4 years ago
- Find open databases - Powered by Binaryedge.io☆15Updated 5 years ago
- The purpose of this tool is to collect all the subdomains using different subdomain finder tools and then filter out those subdomains whi…☆16Updated 2 years ago
- buffer overflow examples☆22Updated 7 years ago
- Kali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by executing stand…☆90Updated last year
- Script to provision a curated set of pentesting tools into a Kali (supported) box.☆13Updated 4 years ago
- DPE - Default Password Enumeration☆34Updated 12 years ago
- Modern Phishing Tool With Advanced Functionality [ Android-Support-Available ]☆30Updated 5 years ago
- Hashes of infamous malware☆26Updated 2 years ago
- random scripts and utilities used for pentesting or R&D purposes☆9Updated last year
- Generates Malicious Macro and Execute Powershell or Shellcode via MSBuild Application Whitelisting Bypass.☆12Updated 6 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆15Updated 8 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Updated 4 years ago
- ⚔️ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting☆13Updated 2 years ago
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆17Updated 3 years ago
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆31Updated last year
- urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Serve…☆36Updated 3 years ago
- An automated e-mail OSINT tool☆23Updated 3 years ago
- Code to check AWS S3 buckets☆17Updated 7 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Updated 4 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆15Updated 5 years ago
- Dockerfile with advanced configurations for Offensive Docker.☆13Updated 4 years ago
- Tool to use Nmap, in Flask with different types of scans. 👁☆10Updated 9 months ago
- New Framework Red Team Operations☆18Updated 4 years ago
- ☆13Updated 2 years ago