rushter / blog_code
Code snippets from my blog
☆25Updated 2 years ago
Alternatives and similar repositories for blog_code:
Users that are interested in blog_code are comparing it to the libraries listed below
- The SSH Multiplex Backdoor Tool☆63Updated 5 years ago
- misc scripts/utils that I've written that aren't deserving of own repos.☆12Updated 3 years ago
- Zone transfers for rwhois☆20Updated 5 years ago
- Ansible scripts to build an attack box☆22Updated 6 years ago
- Salesforce Policy Deviation Checker☆30Updated 4 years ago
- s3eker is an extensible way to find open S3 buckets.☆17Updated 4 years ago
- Compares the TLS configuration of a web server to the Mozilla TLS Profiles☆25Updated last year
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Updated 2 years ago
- The Cloud Blocker☆86Updated 6 months ago
- A tool for enumerating and retrieving exposed git repositories to recover source trees from external environments. Can utilise File Inclu…☆21Updated 4 years ago
- An information gathering tool to collect git emails in version control host services☆11Updated 5 years ago
- LetMeOutOfYour.net Resources☆20Updated 4 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- Fake SMB and SAMR data☆11Updated 5 years ago
- A tool to run nmap against each line in a script.☆17Updated 4 years ago
- DNS server limitation mapper☆26Updated 6 years ago
- A basic AIX enumeration guide for penetration testers/red teamers☆32Updated 7 years ago
- A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo…☆19Updated 2 years ago
- Finding sensitive information in the trimmed parts of cropped images☆28Updated 3 years ago
- Find secrets on any machine from over 120 Different Signatures.☆47Updated 5 months ago
- ☆14Updated 6 years ago
- Extensive code infrastructure for finding unintended information leaks in files, git repositories and much more.☆28Updated 2 years ago
- Standardizing Security Titles☆13Updated 2 years ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆25Updated 5 years ago
- Exfiltration based on custom X509 certificates☆26Updated 10 months ago
- Python tool for large scale git analysis. Inspired by gitrob.☆20Updated 4 years ago
- Ansible role to install Cobalt Strike and optionally configure as Teamserver☆31Updated 3 years ago
- Kibana app for RedELK☆16Updated last year
- Cloud metadata extraction tools and scripts☆34Updated last year