qeeqbox / cyber-attacks
A collection of attacks metadata that were used in my previous pen-test tools
☆17Updated 2 years ago
Alternatives and similar repositories for cyber-attacks:
Users that are interested in cyber-attacks are comparing it to the libraries listed below
- ☆14Updated 4 years ago
- Collection of exploits that were verified by an automated system☆13Updated 3 years ago
- Pure Honeypots with an automated bash script☆20Updated 3 years ago
- Custom security distro for remote penetration testing☆52Updated 3 years ago
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)☆45Updated 3 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆29Updated 7 months ago
- Scripts related to offensiveosint.io☆21Updated 4 years ago
- A meta-scan tool used to kick off a number of command-line security tools during VA/PT work.☆22Updated 2 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- Script to create Onion Mirror for Clearnet site based on Enterprise Onion Toolkit☆14Updated 3 years ago
- urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Serve…☆36Updated 2 years ago
- Hunt and Analyze Tor Onion Sites☆23Updated 2 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Updated 5 years ago
- Maltego integration of https://clearbit.com☆37Updated 4 years ago
- ☆51Updated 3 years ago
- BruteForce SSH Login Credentials much Faster...!...Bring the Thunder of Asgard to SSH☆13Updated 9 months ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Updated 3 years ago
- Pentest ToolKit☆27Updated 4 years ago
- Agile Sandbox for analyzing Windows, Linux and macOS malware and execution behaviors☆67Updated last year
- WebHook for Red Team☆24Updated 3 years ago
- Nqntnqnqmb transform maltego☆24Updated 4 years ago
- Find open databases - Powered by Binaryedge.io☆13Updated 5 years ago
- Simple utility to manage multiple ssh☆14Updated 2 years ago
- A honeypot that can be used to observe traffic directed at home routers.☆19Updated 6 years ago
- Recent cyber attacks reports & interesting analysis files☆15Updated 2 years ago
- personal fork of OSINT tool recon-ng☆17Updated 7 years ago
- SPIZZLE, The Onion Spider.☆13Updated 7 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆27Updated 2 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- BruteProxy.py framework for brute-forcing via HTTP/HTTPS requests with looping proxies.☆12Updated 8 months ago