toolswatch / badgesLinks
ToolsWatch and Black Hat Arsenal selection of badges
☆57Updated last year
Alternatives and similar repositories for badges
Users that are interested in badges are comparing it to the libraries listed below
Sorting:
- DPE - Default Password Enumeration☆36Updated 12 years ago
- Open Standard Vulnerability & Compliance Scanner☆46Updated 10 years ago
- Pentest ToolKit☆28Updated 5 years ago
- Use Tor for anonymous scanning with nmap☆85Updated 10 years ago
- My Dirty Scriptss ..!!!!! Pentest , OSINT , Python ,, Trainings☆54Updated 7 years ago
- Penetration Testing/Security Cheatsheets☆62Updated 10 years ago
- ☆33Updated 9 months ago
- scripts for pentesting☆88Updated 7 years ago
- ☆17Updated last year
- Custom Maltego transforms☆68Updated 10 years ago
- recon-ng Maltego local transform pack☆40Updated 11 years ago
- urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Serve…☆36Updated 3 years ago
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆66Updated 6 years ago
- Proactive Computer Network Defense Strategy - OSINT Real Time Threat Stream - Social/DarkNet - Data Mining☆32Updated 13 years ago
- Tools and scripts dedicated to Android application security☆50Updated 4 years ago
- Python 3 update for https://code.google.com/archive/p/goofile/☆15Updated 6 years ago
- Notes on offensive training☆16Updated 7 years ago
- A continuously curated list of my favorite links and resources relating to Open Source Intelligence gathering.☆19Updated 7 years ago
- Shodan.io Command Line Interface☆44Updated 4 years ago
- Massive arsenal of hacker tools...☆80Updated 8 years ago
- A few transforms and a machine for parsing Nmap XML results☆39Updated 9 years ago
- The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available …☆47Updated 3 years ago
- Package manager for hackers built by hackers☆37Updated 7 years ago
- Crawl Google and Bing to find emails, subdomains and URLs associated to a target domain☆50Updated 4 years ago
- List of Security Archives Tools and software, generally for facilitate security & penetration research. Opening it up to everyone will fa…☆63Updated 8 years ago
- bap - http Basic Authentication honeyPot☆51Updated 10 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆30Updated 4 months ago
- This tool will harvest valid DNS subdomains from a given domain.☆73Updated 3 years ago
- Determine everything you need to know to about a system☆32Updated 7 years ago
- A collection of scripts that pull Open Source Information from the web. Eventually the goal is to put this into a large modular style dat…☆56Updated 10 years ago