securitycipher / awsome-security-mindmaps
☆19Updated 4 months ago
Alternatives and similar repositories for awsome-security-mindmaps
Users that are interested in awsome-security-mindmaps are comparing it to the libraries listed below
Sorting:
- This Python-based GUI application allows you to track the latest security vulnerabilities (CVEs) using the☆39Updated last month
- This repository contains the best fuzzing wordlist files☆29Updated 5 months ago
- Online-Crawler-Wayback-Machine☆27Updated 7 months ago
- Web Penetration Testing Course Materials☆32Updated last year
- 🤖 The Modern, Blazing Fast Port Scanner 🤖☆28Updated 4 months ago
- This is an AD pentest tools collection☆57Updated 10 months ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆61Updated 8 months ago
- External recon toolkit☆48Updated 4 months ago
- dnsprober is a fast and multipurpose DNS reconnaissance tool designed for efficient DNS probing and enumeration. It supports multiple DNS…☆30Updated 2 months ago
- ☆39Updated 9 months ago
- WEB-Wordlist-Generator creates related wordlists after scanning your web applications.☆49Updated 11 months ago
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆60Updated 5 months ago
- AI/LLM local model integration for analysis of reconftw results☆47Updated 2 weeks ago
- An advanced scanner for exposed secrets in web pages, APIs, and source code.☆12Updated 3 weeks ago
- A collection of config files for linux focusing on hackthebox theme☆44Updated 4 months ago
- A command-line utility for performing reverse DNS lookups☆70Updated last year
- A fast subdomain takeover tool☆80Updated last year
- Khonsu is a powerful port scanning tool written in python that detect open ports with concurrent and accurately☆16Updated last year
- IDOR Scanner is a Burp Suite extension that automates the detection and enumeration of potentially vulnerable numeric fields to identify …☆35Updated 2 months ago
- Unauthorized Access to Metadata and User Data like CTF☆26Updated 5 months ago
- HikvisionExploiter is a Python-based utility designed to automate exploitation and directory accessibility checks on Hikvision network ca…☆57Updated last week
- Github Search is a quite powerful and useful feature that can be used to search for sensitive data on repositories. Collection of Github …☆20Updated 9 months ago
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆70Updated 3 months ago
- SprayShark is a modular G-Suite password sprayer with threading!☆36Updated this week
- Keycloak admin API allows low privilege users to use administrative functions☆27Updated 7 months ago
- Manage attack surface data on Elasticsearch☆22Updated last year
- An Vulnerability detection and Exploitation tool for CVE-2024-7339☆18Updated 9 months ago
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆91Updated last year
- POC for CVE-2024-40348. Will attempt to read /etc/passwd from target☆30Updated 9 months ago
- Burp extension to track your current IP address. Extension focused for red teams where the attacker needs to log all used IP addresses.☆25Updated last year