qeeqbox / cyber-attacksLinks
A collection of attacks metadata that were used in my previous pen-test tools
☆17Updated 2 years ago
Alternatives and similar repositories for cyber-attacks
Users that are interested in cyber-attacks are comparing it to the libraries listed below
Sorting:
- ☆14Updated 4 years ago
- Collection of exploits that were verified by an automated system☆13Updated 4 years ago
- Copy of Fresh Onions is an open source TOR spider / hidden service onion crawler☆26Updated 4 years ago
- A database for storing, querying and doing stats on credential leaks☆39Updated 2 years ago
- Custom security distro for remote penetration testing☆53Updated 4 years ago
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)☆46Updated 4 years ago
- Pure Honeypots with an automated bash script☆20Updated 3 years ago
- Scripts related to offensiveosint.io☆23Updated 5 years ago
- Recent cyber attacks reports & interesting analysis files☆15Updated 3 years ago
- Pentest ToolKit☆28Updated 5 years ago
- ☆52Updated 4 years ago
- BruteForce SSH Login Credentials much Faster...!...Bring the Thunder of Asgard to SSH☆13Updated last year
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆38Updated 2 years ago
- A full-fledged msfrpc library for Metasploit framework.☆13Updated 7 years ago
- Collections of way to evade normal detection events.☆25Updated 4 years ago
- A python script which allows you to parse GeoLocation data from your Image files stored in a dataset.It also produces output in CSV file …☆41Updated 4 years ago
- A honeypot that can be used to observe traffic directed at home routers.☆19Updated 6 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Updated 5 years ago
- ☆20Updated 5 years ago
- ☆19Updated 4 months ago
- Simple Phishing Toolkit is a super easy to install and use phishing framework built to help Information Security professionals find human…☆27Updated 7 years ago
- CERT Australia Cyber Threat Intelligence (CTI) Toolkit☆14Updated 7 years ago
- A script for easily building customized images of pentesting distros (Kali and ParrotSec).☆17Updated 4 years ago
- Information gathering tool - OSINT☆36Updated 6 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆30Updated 11 months ago
- Agile Sandbox for analyzing Windows, Linux and macOS malware and execution behaviors☆71Updated last year
- OSINT Browser Plugins☆39Updated 8 years ago
- Find open databases - Powered by Binaryedge.io☆15Updated 5 years ago
- Accompanying documentation, images, source code and other stuff from the cybernomad.online blog☆28Updated 4 years ago
- An inventory of tools and resources about CyberSecurity that aims to help people to find everything related to CyberSecurity.☆13Updated 4 years ago