simeononsecurity / FireFox-Security-ResearcherLinks
Configure FireFox with Security and Intelligance features for OSINT and Security Investigations.
☆16Updated last year
Alternatives and similar repositories for FireFox-Security-Researcher
Users that are interested in FireFox-Security-Researcher are comparing it to the libraries listed below
Sorting:
- Automate All Pivoting System Enumeration with this Bash Script☆13Updated 2 years ago
- Capture screenshots of onion services on an onion service.☆70Updated last year
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- Enumeration & fingerprint tool☆24Updated last year
- web application pentesting tools for docker☆18Updated 3 years ago
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆40Updated last year
- DNSrecon tool with GUI for Kali Linux☆60Updated 2 years ago
- quick and dirty proof-of-concept to hide shells in images☆50Updated last year
- Modular framework to exploit UPS devices☆63Updated 2 years ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆39Updated last year
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆43Updated last year
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆121Updated last year
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆25Updated 3 years ago
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆17Updated 3 years ago
- hiding in plain sight: part 2☆45Updated last year
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆39Updated last year
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆32Updated 3 years ago
- A powerful and flexible tool to apply active attacks for disrupting stegomalware☆54Updated 3 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆29Updated 3 years ago
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆18Updated 2 years ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated last year
- It was developed to speed up the processes of SOC Analysts during analysis☆49Updated last year
- Kali Packerge Manager☆65Updated last year
- Extendable Python script handler for automating penetration testing.☆39Updated 2 years ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆34Updated 2 months ago
- APK Infrastructure Investigator☆63Updated 2 years ago
- Ransomware Simulator for Blue team ,Ransomware Simulator for Red team ,Ransomware infographic, open source Anti Ransomware, Ransomware As…☆35Updated 4 years ago
- Fetch information about a public Google document.☆13Updated 2 years ago
- ☆28Updated last year
- The Kill-The-Code Python Program provides a robust mechanism for remotely controlling code execution by monitoring a specified URL for a …☆17Updated last year