sullo / other-toolsLinks
Other tools developed by CIRT.net
☆23Updated 4 years ago
Alternatives and similar repositories for other-tools
Users that are interested in other-tools are comparing it to the libraries listed below
Sorting:
- ☆16Updated 4 years ago
- Simple PowerShell script to quickly add Windows Firewall Rules☆15Updated 7 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆14Updated 5 years ago
- Open-source Exploiting Framework☆30Updated 8 years ago
- Subdomain crawler with wordlist using python☆12Updated 5 years ago
- Malicious Link Blog☆25Updated last year
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆35Updated 4 years ago
- Scripts related to offensiveosint.io☆22Updated 5 years ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆13Updated 3 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆18Updated 4 years ago
- It is a script written in Python that performs brute force on workers' payroll files through the use of their DNI (National Identity Docu…☆12Updated 4 years ago
- personal fork of OSINT tool recon-ng☆18Updated 7 years ago
- A framework for secure and scalable network traffic analysis - https://netcap.io☆17Updated 6 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Updated 3 years ago
- A meta-scan tool used to kick off a number of command-line security tools during VA/PT work.☆23Updated 3 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆30Updated 10 months ago
- SPIZZLE, The Onion Spider.☆13Updated 7 years ago
- Tools for attacking various MIFARE RFID cards☆15Updated 5 years ago
- DPE - Default Password Enumeration☆34Updated 12 years ago
- The hacker technical cheat sheet☆39Updated last week
- Tutorials for getting started with Pwntools☆12Updated 2 years ago
- Bash Recon Scan - Recon and Scan a network using Bash☆29Updated 2 years ago
- Remove Offensive and Profane Words from Wordlists☆14Updated last year
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Updated 4 years ago
- Free tools for mobile testing.☆34Updated 3 years ago
- Dockerfile with advanced configurations for Offensive Docker.☆13Updated 4 years ago
- BruteForce SSH Login Credentials much Faster...!...Bring the Thunder of Asgard to SSH☆13Updated last year
- A repository for maintaining a list of the top domains based on multiple lists☆21Updated 3 years ago
- ☆33Updated 4 months ago
- A script for easily building customized images of pentesting distros (Kali and ParrotSec).☆17Updated 4 years ago