opsdisk / cyber_plumbers_handbook_lab_infoLinks
Information for accessing The Cyber Plumber's Handbook Lab
☆31Updated 3 years ago
Alternatives and similar repositories for cyber_plumbers_handbook_lab_info
Users that are interested in cyber_plumbers_handbook_lab_info are comparing it to the libraries listed below
Sorting:
- A web front-end for password cracking and analytics☆16Updated 6 years ago
- ☆33Updated 10 months ago
- Script to provision a curated set of pentesting tools into a Kali (supported) box.☆13Updated 4 years ago
- Scripts and One-Liners☆22Updated 10 months ago
- A tool for simplifying the process of researching IOCs.☆25Updated 4 years ago
- A cheat sheet that contains the most OpenSSL commands used by Dev, SysAdmin in real life.☆62Updated 5 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆25Updated last year
- Papers, presentations and documents from the team at Hacker House.☆52Updated 6 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated last year
- Create visualization from Shodan query☆75Updated 4 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Updated 3 years ago
- Convert Wigle.net result from json to Kml☆15Updated 4 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- s3eker is an extensible way to find open S3 buckets.☆17Updated 5 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆15Updated 5 years ago
- Easily-guessable Password Generator for Password Spray Attack☆20Updated 5 years ago
- Links to materials referenced in the SANS Tech Tuesday workshop June 30,2020☆29Updated 5 years ago
- An experiment to address digital intelligence archiving on offensive engagements.☆26Updated 5 years ago
- Bulk hostname lookup using shodan☆14Updated 3 years ago
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆64Updated 4 years ago
- Custom pentesting tools☆25Updated 5 years ago
- Hashes of infamous malware☆26Updated 2 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆20Updated 2 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated last year
- URL fingerprinting made easy☆89Updated last year
- Remove Offensive and Profane Words from Wordlists☆15Updated 2 years ago
- Man in the Browser Framework☆50Updated 11 months ago
- ☆36Updated 2 years ago
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆55Updated 4 years ago
- Field guide to gather low-hanging fruits☆13Updated 8 months ago