thevickypedia / NetSecLinks
Python module to analyze devices connected to the router and alert accordingly.
☆19Updated 2 years ago
Alternatives and similar repositories for NetSec
Users that are interested in NetSec are comparing it to the libraries listed below
Sorting:
- ☆65Updated last year
- ☆24Updated last year
- Garudaastra Tool is based on python3 to find cameras around the world☆27Updated 2 years ago
- Powershell tools used for Red Team / Pentesting.☆79Updated last year
- Automate Scoping, OSINT and Recon assessments.☆96Updated 8 months ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆121Updated last year
- ☆25Updated 2 years ago
- ScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the F…☆26Updated last year
- Discovering Typo Squatting on your domains!☆73Updated last year
- Challenge Python☆19Updated 2 years ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Updated last year
- 🕵️ Email osint tool☆62Updated 2 years ago
- DorkEye is a Python script for ethical dorking. The goal is to identify unintentionally exposed resources, such as sensitive files, login…☆56Updated 2 months ago
- A small executable to trick a user to authenticate using code matching MFA☆69Updated last year
- Web Path Finder☆61Updated last year
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆39Updated last year
- Tools and Resources for Physical Security Red Teaming☆42Updated 6 months ago
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆29Updated 2 years ago
- Fast Path Traversal exploitation tool☆21Updated last year
- A Slack bot phishing framework for Red Teaming exercises☆166Updated last year
- Top 400 passwords as per HaveIBeenPwned☆22Updated 11 months ago
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆60Updated 10 months ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆147Updated last year
- A curated list of tools and resources that I use daily as a Purple-Team operator.☆90Updated 4 months ago
- Capture screenshots of onion services on an onion service.☆72Updated last year
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆40Updated 2 years ago
- This is an AD pentest tools collection☆59Updated last year
- This repository contains the best fuzzing wordlist files☆34Updated 10 months ago
- Cobalt Strike is threat emulation software. Red teams and penetration testers use Cobalt Strike to demonstrate the risk of a breach and e…☆16Updated 2 years ago
- A curated list wordlists for bruteforcing and fuzzing☆83Updated 2 years ago