raajheshkannaa / attack-surface-managementView external linksLinks
Gather all external facing AWS Services and run it through nmap
☆13Feb 3, 2022Updated 4 years ago
Alternatives and similar repositories for attack-surface-management
Users that are interested in attack-surface-management are comparing it to the libraries listed below
Sorting:
- A tool for identifying misconfigured CloudFront domains☆17Apr 27, 2018Updated 7 years ago
- ☆10Feb 5, 2026Updated last week
- wordlists for password cracking☆28Aug 15, 2022Updated 3 years ago
- Repository containing machine solving attempts and results generated by BoxPwnr☆15Updated this week
- Purple-team telemetry & simulation toolkit.☆107Dec 16, 2025Updated last month
- Small Node CLI tool to extract active contributors on repos and orgs☆10Dec 6, 2022Updated 3 years ago
- The Eureka Lab Series is designed for learners at all levels of experience and interest in security concepts and technologies.☆10Nov 30, 2025Updated 2 months ago
- Cyences App (Cyber Defense) built by CrossRealms International - https://splunkbase.splunk.com/app/5351/☆11Updated this week
- Open Data and sources for OSINT in Tajikistan☆13Jan 17, 2025Updated last year
- Fixes corrupted Magic Bytes for PNG, JPG and JPEG☆10Aug 4, 2021Updated 4 years ago
- Analyzes software dependencies across GitHub repositories to identify security vulnerabilities and health risks in your supply chain.☆118Dec 9, 2025Updated 2 months ago
- An OpenAPI specification for the Rocket.Chat API.☆10Updated this week
- ☆13Feb 2, 2026Updated last week
- ☆10Jan 14, 2015Updated 11 years ago
- Solving CAPTCHA with Image Classification☆10Mar 13, 2025Updated 11 months ago
- This is a example project about how to create a simple blog like oriented API server with Django REST Framework using ModelViewSets and S…☆10May 13, 2022Updated 3 years ago
- Assess certain AWS network configurations☆12Aug 22, 2018Updated 7 years ago
- The set of standards that Geomys maintainers strive to uphold in our professional activity as open source maintainers☆35Oct 23, 2025Updated 3 months ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- ☆11Jun 9, 2020Updated 5 years ago
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆16Jan 13, 2022Updated 4 years ago
- Pipe stuff to Neo4j☆10Jun 4, 2020Updated 5 years ago
- token exchange as a service☆11Feb 5, 2026Updated last week
- Set up your own CTF with NIZKCTF☆14Oct 20, 2017Updated 8 years ago
- ☆10Oct 12, 2021Updated 4 years ago
- ☆16Sep 9, 2025Updated 5 months ago
- Agressor script for Cobalt Strike to mark users as owned in bloodhound from the Cobalt Strike credentials tab.☆12Dec 21, 2019Updated 6 years ago
- PrettyRecon-cli is an unofficial cli client for PrettyRecon. This tool can be used to trigger various tasks on prettyrecon as well as fe…☆10May 9, 2025Updated 9 months ago
- 🌈 Render PowerShell in the Terminal with Syntax Highlighting☆10May 25, 2023Updated 2 years ago
- Process doppelganging POC using direct system calls, PPID spoofing and dropbox as an external delivery channel for the payload.☆16Jan 7, 2021Updated 5 years ago
- Cobalt Strike automation scripts collection☆12Oct 28, 2020Updated 5 years ago
- A CLI tool (and library) written in Go to simplify the process of retrieving IP addresses from infrastructure hosted on Google Cloud Plat…☆11Nov 20, 2025Updated 2 months ago
- Kantega Web Application Security Hero Challenge☆19Dec 3, 2020Updated 5 years ago
- bash script to prepare Debian machines for OSINT use☆11Apr 10, 2020Updated 5 years ago
- ☆11Oct 30, 2019Updated 6 years ago
- A quick way to perform a bulk whois query. Utilizes Team Cymru's service. Requires netcat.☆11Feb 11, 2012Updated 14 years ago
- SANS #CTI Summit 2025☆13Jan 28, 2025Updated last year
- AI copilot for n8n.☆20Jun 25, 2025Updated 7 months ago
- Course material for University of Texas, Computer Science Department course CS 361 - Introduction to Computer Security☆11Nov 17, 2015Updated 10 years ago