polo-sec / armoryLinks
A curated repository of the tools, scripts, resources and programs I use regularly for CTF, BB or other security work.
☆16Updated 4 years ago
Alternatives and similar repositories for armory
Users that are interested in armory are comparing it to the libraries listed below
Sorting:
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆58Updated 5 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 3 years ago
- Resources for AD penetration testing and security☆33Updated 3 years ago
- Information-Gathering Shell Script☆30Updated 5 years ago
- autocrack adds queue support for hashcat cracking.☆40Updated 2 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- recon-ng modules for Censys☆38Updated 2 years ago
- S3 bucket enumerator☆30Updated 6 years ago
- ☆24Updated 6 years ago
- Empower your enumeration during OSCP☆36Updated 6 years ago
- Distributed Nmap, wrapper around Nmap to allow distributed network enumeration.☆20Updated 6 months ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆50Updated 5 years ago
- OWASP Foundation Web Respository☆36Updated 4 years ago
- Take domains on stdin and output them on stdout if they get resolved☆32Updated 3 years ago
- ☆42Updated 7 months ago
- Create visualization from Shodan query☆75Updated 4 years ago
- My pen testing notes☆52Updated 2 years ago
- Defcon 28 - Red Team Village - Applied Purple Teaming - Why Can't We Be Friends☆26Updated 5 years ago
- Script to provision a curated set of pentesting tools into a Kali (supported) box.☆13Updated 4 years ago
- Various scripts and codes☆85Updated 4 years ago
- A simple program to query nmap xml files in the terminal.☆27Updated 5 years ago
- Ideaslocas Repository☆37Updated 4 years ago
- Automated compromise detection of the world's most popular packages☆17Updated 2 years ago
- A compilation of network scanning strategies to find vulnerable devices☆73Updated 3 years ago
- Deploy multiple instances of Nessus in docker containers easily☆20Updated 4 years ago
- ☆38Updated 4 years ago
- Import Nmap scans to Cherrytree☆37Updated 3 years ago
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆17Updated 3 years ago
- Publicly availalbe vulnarble by desgin vm/machines☆43Updated 3 years ago
- New Framework Red Team Operations☆19Updated 4 years ago