s0i37 / defenceLinks
Hackings style defence tricks
☆52Updated 2 weeks ago
Alternatives and similar repositories for defence
Users that are interested in defence are comparing it to the libraries listed below
Sorting:
- Setezor is a network traffic analyzer with the ability to automatically build network topology☆173Updated last month
- ☆133Updated 4 years ago
- Ресурсы, связанные с безопасностью приложений, исследователями и разработчиками в области безопасности.☆51Updated 3 years ago
- Friendly graphical output of the nmap tool that allows filtering by open ports☆187Updated 3 years ago
- All in 1 phishing framework☆38Updated 3 years ago
- Modern web-based distributed hashcracking solution, built on hashcat☆146Updated this week
- Linux-based botnet builder designed for creating advanced botnet payloads.☆100Updated 3 weeks ago
- Repository contains a collection of scripts designed to demonstrate and exploit various vulnerabilities in HTTP and related protocols☆30Updated this week
- 🔪 Dumper & ripper for Telegram bots by token☆220Updated last year
- A monster cheatsheet on MITM attacks☆367Updated 5 months ago
- Light-weight web security scanner☆150Updated last week
- ☆103Updated last year
- Набор инструментов для OSINT в VKontakte. Основано на материалах Rawrdcore☆183Updated last year
- TelAnalysis - Telegram Analysis tool☆148Updated 9 months ago
- https://t.me/+V6d8SvKVFXo2MjIy☆42Updated 2 years ago
- ChromeStealer is a tool for educational purposes to demonstrate how to extract and decrypt stored passwords from Google Chrome on a Windo…☆181Updated last year
- vusialization of geo points from photos from vk profile☆49Updated 3 years ago
- A bash script for performing advanced Google dork searches to find files, names, usernames, emails, phone numbers, and images.☆28Updated last year
- Коллекция из нескольких сотен онлайн-инструментов для OSINT☆53Updated 3 years ago
- File Hider is a sophisticated tool that allows you to securely hide and encrypt a file within another file using multiple layers of AES-2…☆138Updated last year
- Reverse proxies cheatsheet☆25Updated 2 years ago
- ☆142Updated 5 years ago
- Penetration tests on SSH servers using brute force or dictionary attacks. Written in C.☆176Updated last year
- Framework for Telegram users and chats investigating☆76Updated 5 months ago
- I do not own nor did I create these. I simply found publicly available cheat sheets and compiled a list for InfoSec students. This list c…☆91Updated 3 years ago
- The legendary netstalking NEtwork SCAnner☆210Updated 7 years ago
- Deployment VPN using ansible playbooks☆45Updated 3 years ago
- For the most part, these are RUS tg channels and assembled manually in channels.txt. The list of subscribers is updated every 12 hours.☆38Updated last year
- Maltego Transforms for OSINT on Telegram Messenger☆381Updated 2 months ago
- The Telegram Snowball Sampling Tool is a Python-based utility designed for conducting snowball sampling to collect Telegram channels thro…☆117Updated 2 months ago