qeeqbox / cyber-attacks
A collection of attacks metadata that were used in my previous pen-test tools
☆17Updated 2 years ago
Alternatives and similar repositories for cyber-attacks:
Users that are interested in cyber-attacks are comparing it to the libraries listed below
- ☆14Updated 4 years ago
- Collection of exploits that were verified by an automated system☆13Updated 3 years ago
- Custom security distro for remote penetration testing☆52Updated 4 years ago
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)☆45Updated 3 years ago
- Pure Honeypots with an automated bash script☆20Updated 3 years ago
- Proof of concept for a security issue (in my opinion) that I found in accounts.google.com☆21Updated 10 years ago
- Recent cyber attacks reports & interesting analysis files☆15Updated 3 years ago
- Good info about DeepWeb and OSINT☆32Updated 2 weeks ago
- A database for storing, querying and doing stats on credential leaks☆39Updated last year
- Use the Hacker Target IP Tools API for Reconnaissance in Maltego☆58Updated 4 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆36Updated 2 years ago
- Simple Phishing Toolkit is a super easy to install and use phishing framework built to help Information Security professionals find human…☆26Updated 6 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆29Updated 9 months ago
- Toutatis transform for maltego☆38Updated 2 years ago
- Agile Sandbox for analyzing Windows, Linux and macOS malware and execution behaviors☆68Updated last year
- A meta-scan tool used to kick off a number of command-line security tools during VA/PT work.☆23Updated 2 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Updated 5 years ago
- A framework for secure and scalable network traffic analysis - https://netcap.io☆17Updated 5 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- Scripts used for phishing campaigns☆14Updated 10 years ago
- ANONYMOUS WIFI HOTSPOT☆2Updated 5 years ago
- Scripts related to offensiveosint.io☆21Updated 4 years ago
- ☆52Updated 4 years ago
- CERT Australia Cyber Threat Intelligence (CTI) Toolkit☆12Updated 7 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Updated 4 years ago
- bash script to prepare Debian machines for OSINT use☆11Updated 5 years ago
- pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching☆12Updated 2 years ago
- Accompanying documentation, images, source code and other stuff from the cybernomad.online blog☆28Updated 4 years ago
- Fast subdomains enumeration tool for penetration testers☆15Updated 5 years ago
- personal fork of OSINT tool recon-ng☆18Updated 7 years ago