securitycipher / awsome-security-mindmapsLinks
β17Updated 10 months ago
Alternatives and similar repositories for awsome-security-mindmaps
Users that are interested in awsome-security-mindmaps are comparing it to the libraries listed below
Sorting:
- π€ The Modern, Blazing Fast Port Scanner π€β28Updated 10 months ago
- This Python-based GUI application allows you to track the latest security vulnerabilities (CVEs) using theβ39Updated 7 months ago
- Probuster : A Python based Web Application Penetration testing tool for Information Gatheringβ‘.β60Updated 11 months ago
- Physical penetration testing is a critical aspect of security assessment that involves simulating real-world attacks to evaluate the effeβ¦β82Updated 6 months ago
- This repository contains the best fuzzing wordlist filesβ34Updated 10 months ago
- A fast subdomain takeover toolβ84Updated last year
- Web Path Finderβ61Updated last year
- TrafficWatch, a packet sniffer tool, allows you to monitor and analyze network traffic from PCAP filesβ119Updated last year
- This is an AD pentest tools collectionβ59Updated last year
- An advanced scanner for exposed secrets in web pages, APIs, and source code.β12Updated 6 months ago
- Web Penetration Testing Course Materialsβ32Updated last year
- The perfect butler for pentesters, bug-bounty hunters and security researchersβ92Updated last year
- β127Updated 4 months ago
- External recon toolkitβ53Updated 10 months ago
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.β39Updated last year
- Online-Crawler-Wayback-Machineβ27Updated last year
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.β74Updated 3 months ago
- Gixposed is a powerful command-line tool designed to search the commit history of Git repositories for sensitive information, such as APIβ¦β38Updated 10 months ago
- A fast Go-based tool to uncover sensitive information in JavaScriptβ34Updated 3 months ago
- β110Updated 3 weeks ago
- CVE-2023-43261 - Credential Leakage Through Unprotected System Logs and Weak Password Encryptionβ57Updated 2 years ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.β44Updated last year
- dnsprober is a fast and multipurpose DNS reconnaissance tool designed for efficient DNS probing and enumeration. It supports multiple DNSβ¦β33Updated 4 months ago
- DorkEye is a Python script for ethical dorking. The goal is to identify unintentionally exposed resources, such as sensitive files, loginβ¦β58Updated 3 months ago
- β40Updated last year
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.β65Updated last year
- WEB-Wordlist-Generator creates related wordlists after scanning your web applications.β52Updated last year
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.β28Updated last year
- Curated collection of cybersecurity tools featured in Black Hat Arsenal events.β62Updated 3 months ago
- The app is used to download posts from Telegram feeds and save them to text files for later OSINT AI useβ51Updated 7 months ago