murchie85 / cyber_compendiumLinks
A one stop shop for all cyber tooling, frameworks and hacking methodologies
☆11Updated 4 years ago
Alternatives and similar repositories for cyber_compendium
Users that are interested in cyber_compendium are comparing it to the libraries listed below
Sorting:
- SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types i…☆14Updated 9 years ago
- DPE - Default Password Enumeration☆36Updated 12 years ago
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆17Updated 3 years ago
- ☆12Updated 5 years ago
- Collection of offensive tools targeting Microsoft Azure☆10Updated 3 years ago
- Fuzz for hidden proxies, vhosts, and URLs☆15Updated 4 years ago
- ☆20Updated 12 years ago
- This is a simple Python script that connects to a MISP instance and retrieves attributes of specific types (such as IP addresses, URLs, a…☆16Updated 2 years ago
- An automated e-mail OSINT tool☆24Updated 3 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆12Updated 3 years ago
- Automated network asset, email, and social media profile discovery and cataloguing.☆13Updated 3 years ago
- The purpose of this tool is to collect all the subdomains using different subdomain finder tools and then filter out those subdomains whi…☆15Updated 2 years ago
- Notes and Commands for CTFs☆23Updated 5 years ago
- Phishable is a project that logs misconfigured DNS that can be exploited to conduct phishing attacks & spoof domains. Phishable helps org…☆22Updated 2 years ago
- Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. The…☆11Updated 3 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Updated 4 years ago
- CRACK AND CHECK HASH TYPES IN BULK☆12Updated 4 years ago
- Red Teaming Tactics and Techniques☆13Updated 3 years ago
- Find open databases - Powered by Binaryedge.io☆14Updated 5 years ago
- buffer overflow examples☆22Updated 7 years ago
- CloudDefense.ai is an automated web application security testing tool that audits your web applications by checking for vulnerabilities l…☆49Updated 8 months ago
- Auto Web Vulnerability Scanning Framework☆10Updated 9 years ago
- Scripts, tools and drivers for wardriving under Mac OSX☆14Updated 8 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Updated 4 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆17Updated 4 years ago
- An advanced multithreaded admin panel finder written in python.☆14Updated 4 years ago
- Damn Small SQLi Scanner. (DSSS)☆16Updated 7 years ago
- An Open Source Intelligence Framework to investigate and keep track of the investigation of a certain individual☆16Updated 2 years ago
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆31Updated 2 years ago
- Hashes of infamous malware☆26Updated 2 years ago