santosomar / Probable-Wordlists
Version 2 is live! Wordlists sorted by probability originally created for password generation and testing - make sure your passwords aren't popular!
☆14Updated last year
Related projects: ⓘ
- Curated list of public penetration test reports released by several consulting firms and academic security groups☆37Updated 7 years ago
- A detailed guide showing you different ways you can incorporate Python into your workflows around Nmap.☆150Updated 2 years ago
- Shell Please 1.0 : Reverse shell code generator.☆35Updated 2 years ago
- DigitalShadows Alert Feeder for TheHive, an Open Source and Free Security Incident Response Platform☆35Updated 5 years ago
- TunnelPy simply exposes any service, running internally in a network/host, to the outside, by creating a tunnel between a client on the o…☆21Updated 3 years ago
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆49Updated 2 years ago
- ☆54Updated 4 years ago
- links collected from SOC Core Skills class☆84Updated 3 years ago
- Dictionary cracking tool for HTTP Digest challenge/response hashes☆29Updated last year
- Reconnaissance and Enumeration automation script☆51Updated 3 years ago
- Let's obscure some IPv4 addresses☆36Updated last year
- Used to check for TCP and UDP egress filtering on both windows and unix client systems☆147Updated 3 years ago
- ☆15Updated 5 years ago
- ☆76Updated 3 years ago
- Random notes collected on the intertubes relating to DFIR☆32Updated last year
- 👹☆57Updated 3 years ago
- Test tool for CVE-2020-1472☆33Updated last year
- Configuration Hardening Assessment PowerShell Script (CHAPS)☆170Updated 4 months ago
- ☆39Updated 2 months ago
- Post exploitation helper☆37Updated last year
- ☆19Updated 5 years ago
- ☆27Updated this week
- Parse .nessus file(s) and shows output in interactive UI☆146Updated 5 months ago
- ☆18Updated this week
- If you've ever picked up a book on Wireshark or network monitoring, they almost all cover about the same information. They'll show you, "…☆18Updated 5 years ago
- ☆37Updated this week
- Small easy to find cheat sheet for Active directory exploitation☆44Updated 4 years ago
- All the common commands used in a red teaming operation or CTF. This is a work in progress and will be updated with time.☆42Updated 4 years ago
- ☆42Updated 3 weeks ago
- Learning by Practising - Hack & Detect - A Practical Guide to Hacking and its Detection via network forensics☆75Updated last year