s0i37 / defenceLinks
Hackings style defence tricks
☆32Updated 2 weeks ago
Alternatives and similar repositories for defence
Users that are interested in defence are comparing it to the libraries listed below
Sorting:
- ☆96Updated last year
- All in 1 phishing framework☆38Updated 2 years ago
- Setezor is a network traffic analyzer with the ability to automatically build network topology☆159Updated this week
- vusialization of geo points from photos from vk profile☆51Updated 3 years ago
- My Wi-Fi scripts☆47Updated last year
- 1C RAS Offensive Security Tool☆26Updated last year
- ☆18Updated 2 weeks ago
- Cisco IOS Security Inspector☆32Updated 3 months ago
- ☆133Updated 4 years ago
- Framework for Telegram users and chats investigating☆76Updated 3 weeks ago
- Friendly graphical output of the nmap tool that allows filtering by open ports☆186Updated 2 years ago
- For the most part, these are RUS tg channels and assembled manually in channels.txt. The list of subscribers is updated every 12 hours.☆35Updated 7 months ago
- Light-weight web security scanner☆151Updated 3 months ago
- https://t.me/+V6d8SvKVFXo2MjIy☆44Updated 2 years ago
- karma WiFi attack implementation☆51Updated 8 months ago
- Useful collection of scapy-scripts and more☆29Updated last year
- ☆40Updated 2 years ago
- Linux-based botnet builder designed for creating advanced botnet payloads.☆93Updated last month
- File Hider is a sophisticated tool that allows you to securely hide and encrypt a file within another file using multiple layers of AES-2…☆129Updated last year
- Ресурсы, связанные с безопасностью приложений, исследователями и разработчиками в области безопасности.☆51Updated 3 years ago
- Deployment VPN using ansible playbooks☆45Updated 2 years ago
- A web service to clean documents from potentially privacy-invasive metadata☆51Updated 2 months ago
- Modern web-based distributed hashcracking solution, built on hashcat☆141Updated last week
- Finding secrets in various (non-text) popular files.☆25Updated 5 months ago
- exfiltration/infiltration toolkit☆45Updated 7 months ago
- A bash script for performing advanced Google dork searches to find files, names, usernames, emails, phone numbers, and images.☆27Updated last year
- An asynchronous TCP and UDP port scanner developed by the late Jack C. Louis.☆35Updated 10 years ago
- Bundle of common passwords targeting RUSSIAN-speaking audience (parsed from big data leaks)☆99Updated 6 years ago
- I do not own nor did I create these. I simply found publicly available cheat sheets and compiled a list for InfoSec students. This list c…☆89Updated 3 years ago
- ChromeStealer is a tool for educational purposes to demonstrate how to extract and decrypt stored passwords from Google Chrome on a Windo…☆151Updated 11 months ago