murchie85 / cyber_compendiumLinks
A one stop shop for all cyber tooling, frameworks and hacking methodologies
☆11Updated 4 years ago
Alternatives and similar repositories for cyber_compendium
Users that are interested in cyber_compendium are comparing it to the libraries listed below
Sorting:
- SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types i…☆14Updated 9 years ago
- Notes and Commands for CTFs☆23Updated 5 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆25Updated 4 years ago
- Fuzz for hidden proxies, vhosts, and URLs☆15Updated 4 years ago
- Automated Pentest Recon Scanner☆14Updated 8 years ago
- The purpose of this tool is to collect all the subdomains using different subdomain finder tools and then filter out those subdomains whi…☆15Updated 3 years ago
- CRACK AND CHECK HASH TYPES IN BULK☆13Updated 4 years ago
- DPE - Default Password Enumeration☆36Updated 12 years ago
- ☆12Updated 5 years ago
- Red Team Tool Kit☆16Updated 6 years ago
- CloudDefense.ai is an automated web application security testing tool that audits your web applications by checking for vulnerabilities l…☆50Updated 2 weeks ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆20Updated 2 years ago
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆11Updated 6 years ago
- Kali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by executing stand…☆93Updated 2 months ago
- ☆20Updated 12 years ago
- This is automation tool which utilize 2 sub -domain finder and then sort out working sub-domain and finally scan for sub-doamin TAKEOVER.☆10Updated 2 years ago
- SpiderFoot automates OSINT collection so that you can focus on analysis.☆11Updated 2 years ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆12Updated 3 years ago
- Open Penetration Testing Bookmarks Collection☆19Updated 10 years ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆23Updated 2 years ago
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆31Updated 2 years ago
- An automated e-mail OSINT tool☆24Updated 3 years ago
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆17Updated 3 years ago
- Rockyou for web fuzzing☆15Updated 3 years ago
- A meta-scan tool used to kick off a number of command-line security tools during VA/PT work.☆23Updated 3 years ago
- A tool to speed up Android pentesting by automating the APK acquisition and information gathering☆18Updated 3 years ago
- ☆33Updated 10 months ago
- Hashes of infamous malware☆26Updated 2 years ago
- A web front-end for password cracking and analytics☆16Updated 6 years ago
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆11Updated 5 years ago