noraj / unisecLinks
Unicode Security Toolkit
☆20Updated last week
Alternatives and similar repositories for unisec
Users that are interested in unisec are comparing it to the libraries listed below
Sorting:
- Real-time updated lists of U.S. GovCloud IP ranges on Amazon AWS, Microsoft Azure, Google GCP☆18Updated last year
- Dominate the Active Directory game. An Active Directory environments pentest tool complementary to existing ones like NetExec.☆18Updated 3 months ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆10Updated 9 years ago
- Central IoC scanner based on Loki☆20Updated 4 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 5 years ago
- NightWriter is a modern real-time collaborative editing tool secured by end-to-end encryption.☆18Updated 4 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆52Updated 5 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated last year
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆75Updated last year
- CloudDefense.ai is an automated web application security testing tool that audits your web applications by checking for vulnerabilities l…☆50Updated last month
- Script for importing Nmap results into a Neo4j Graph Database☆24Updated 8 months ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 3 years ago
- Write-Ups for TryHackMe☆23Updated 4 years ago
- Nmap Web Dashboard and Reporting☆34Updated 3 years ago
- A tool for simplifying the process of researching IOCs.☆25Updated 4 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Updated 3 years ago
- S3 bucket enumerator☆30Updated 6 years ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆45Updated last year
- An optimized Python3 library to fetch the most recent exploit-database, create searchable indexes for CVE->EDBID and EDBID -> CVE, and pr…☆30Updated last year
- CLI & library to search for default credentials among thousands of Products / Vendors☆69Updated 4 years ago
- Modular framework to exploit UPS devices☆66Updated 2 years ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆35Updated 2 weeks ago
- Distributed Nmap, wrapper around Nmap to allow distributed network enumeration.☆20Updated 7 months ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆25Updated last year
- web application pentesting tools for docker☆17Updated 3 years ago
- CLI & library to search for default credentials among thousands of Products / Vendors☆54Updated 10 months ago
- Hunt and Analyze Tor Onion Sites☆23Updated 3 years ago
- It was developed to speed up the processes of SOC Analysts during analysis☆47Updated last year
- 🗺 Convert nmap XML output to beautiful JSON☆17Updated 2 years ago
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆16Updated 3 years ago