securitycipher / awsome-security-mindmapsLinks
☆18Updated 8 months ago
Alternatives and similar repositories for awsome-security-mindmaps
Users that are interested in awsome-security-mindmaps are comparing it to the libraries listed below
Sorting:
- 🤖 The Modern, Blazing Fast Port Scanner 🤖☆28Updated 8 months ago
- This Python-based GUI application allows you to track the latest security vulnerabilities (CVEs) using the☆39Updated 4 months ago
- ☆124Updated 2 months ago
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆60Updated 9 months ago
- A fast subdomain takeover tool☆82Updated last year
- An advanced scanner for exposed secrets in web pages, APIs, and source code.☆12Updated 4 months ago
- This is an AD pentest tools collection☆58Updated last year
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆92Updated last year
- External recon toolkit☆50Updated 8 months ago
- A fast Go-based tool to uncover sensitive information in JavaScript☆34Updated last month
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆17Updated last month
- Online-Crawler-Wayback-Machine☆27Updated 10 months ago
- Burp Suite extension for bypassing client-side encryption for pentesting and bug bounty in WebSocket☆80Updated last week
- TrafficWatch, a packet sniffer tool, allows you to monitor and analyze network traffic from PCAP files☆120Updated last year
- RADAR (Rapid Assessment of DNS And Reconnaissance) is an advanced DNS reconnaissance tool designed to identify technologies and services …☆101Updated 4 months ago
- This repository contains the best fuzzing wordlist files☆34Updated 8 months ago
- ☆87Updated 5 months ago
- Gixposed is a powerful command-line tool designed to search the commit history of Git repositories for sensitive information, such as API…☆38Updated 8 months ago
- Web Path Finder☆62Updated last year
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆73Updated last month
- Web Penetration Testing Course Materials☆32Updated last year
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆65Updated last year
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆147Updated last year
- ICMPWatch: ICMP Packet Sniffer☆58Updated 10 months ago
- AI Powered Terminal Based Ethical Hacking Assistant☆73Updated 6 months ago
- Exposor is a tool using internet search engines to detect exposed technologies with a unified syntax.☆57Updated last month
- Some useful books related to Cybersecurity, Linux and more.☆52Updated last month
- dnsprober is a fast and multipurpose DNS reconnaissance tool designed for efficient DNS probing and enumeration. It supports multiple DNS…☆33Updated 2 months ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆62Updated last year
- CVE-2023-43261 - Credential Leakage Through Unprotected System Logs and Weak Password Encryption☆58Updated last year