securitycipher / awsome-security-mindmapsLinks
☆17Updated last year
Alternatives and similar repositories for awsome-security-mindmaps
Users that are interested in awsome-security-mindmaps are comparing it to the libraries listed below
Sorting:
- 🤖 The Modern, Blazing Fast Port Scanner 🤖☆28Updated 11 months ago
- This Python-based GUI application allows you to track the latest security vulnerabilities (CVEs) using the☆39Updated 8 months ago
- An advanced scanner for exposed secrets in web pages, APIs, and source code.☆12Updated 8 months ago
- TrafficWatch, a packet sniffer tool, allows you to monitor and analyze network traffic from PCAP files☆127Updated last year
- Physical penetration testing is a critical aspect of security assessment that involves simulating real-world attacks to evaluate the effe…☆84Updated 3 weeks ago
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆60Updated last year
- Web Penetration Testing Course Materials☆32Updated last year
- Gixposed is a powerful command-line tool designed to search the commit history of Git repositories for sensitive information, such as API…☆38Updated last year
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆64Updated last year
- Web Path Finder☆60Updated 2 years ago
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆93Updated last year
- Online-Crawler-Wayback-Machine☆27Updated last year
- This repository contains the best fuzzing wordlist files☆34Updated last year
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- A fast Go-based tool to uncover sensitive information in JavaScript☆39Updated 5 months ago
- BlackMail is a tool for creating and sending spoof mail.☆39Updated 2 years ago
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆41Updated 2 years ago
- This is an AD pentest tools collection☆59Updated last year
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆74Updated 5 months ago
- DorkEye is a Python script for ethical dorking. The goal is to identify unintentionally exposed resources, such as sensitive files, login…☆64Updated 5 months ago
- If you a security engineer or an aspirant Security professional then Setting up a Wazuh home lab environment is an excellent way for SOC …☆15Updated last year
- AI / LLM Red Team Field Manual & Consultant’s Handbook☆210Updated 2 weeks ago
- A comprehensive Python-based security tool for file scanning, malware detection, and analysis in an ever-evolving cyber landscape.☆111Updated 2 years ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146Updated last year
- specialized investigative framework to investigate cases of malicious actors in the OSINT and backup dark forums.☆67Updated 4 months ago
- ☆65Updated last year
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆61Updated last year
- ☆133Updated 6 months ago
- Prompts for performing tests on your Kali Linux using Gemini-cli, ChatGPT, DeepSeek, CursorAI, Claude Code, and Copilot.☆158Updated last week
- WEB-Wordlist-Generator creates related wordlists after scanning your web applications.☆52Updated last year