polo-sec / armory
A curated repository of the tools, scripts, resources and programs I use regularly for CTF, BB or other security work.
☆16Updated 3 years ago
Alternatives and similar repositories for armory:
Users that are interested in armory are comparing it to the libraries listed below
- Information-Gathering Shell Script☆29Updated 4 years ago
- ☆33Updated 2 months ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆57Updated 4 years ago
- Small python script wrapper for automating hashcat commands☆37Updated 4 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- ☆42Updated 2 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 8 months ago
- Commands used in Windows penetration tests☆50Updated 3 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆13Updated 11 months ago
- A collection of commands, scripts, tips, tricks, and other information compiled during my journey to obtaining the OSCP certification.☆23Updated 4 years ago
- S3 bucket enumerator☆29Updated 5 years ago
- ☆20Updated 3 years ago
- This repository will serve as the "master" repo containing all trainings and tutorials done in preperation for OSWE in conjunction with t…☆13Updated 5 years ago
- This contains the contents needed to deploy a home lab in VirtualBox.☆18Updated 4 years ago
- Simple Nmap XML parsing script. Doesn't do anything fancy☆19Updated 4 years ago
- recon-ng modules for Censys☆37Updated last year
- Wireless Pentesting Device☆20Updated 4 years ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆113Updated 3 years ago
- Pentesting notes☆17Updated last month
- autocrack adds queue support for hashcat cracking.☆41Updated 2 years ago
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Updated 5 years ago
- Create visualization from Shodan query☆72Updated 3 years ago
- Simple script to generate commands to achieve reverse shells.☆11Updated 5 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 5 months ago
- A simple program to query nmap xml files in the terminal.☆27Updated 4 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 2 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆73Updated 4 months ago
- ☆21Updated 6 years ago