xmpf / mindmapsLinks
Mindmaps allow to organize and understand information faster and better.
☆2Updated 3 years ago
Alternatives and similar repositories for mindmaps
Users that are interested in mindmaps are comparing it to the libraries listed below
Sorting:
- Find the remote website version based on a git repository☆126Updated 4 years ago
- Enumerate AWS permissions and resources.☆69Updated 2 years ago
- ☆38Updated 3 years ago
- Custom scripts for the PIPER Burp extensions.☆98Updated last year
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆50Updated 4 years ago
- Merge multiple nMap xml files into one☆50Updated 6 years ago
- A list of "secrets" from JWT sample code and readme files.☆55Updated 4 years ago
- ☆22Updated 4 years ago
- Network penetration testing toolset wrapper☆81Updated 2 years ago
- ☆51Updated 4 months ago
- A wordlist that is kept up to date with the latest headlines to provide relevant words to human society☆119Updated 3 years ago
- ☆119Updated 2 years ago
- A collection of commands, scripts, tips, tricks, and other information compiled during my journey to obtaining the OSCP certification.☆23Updated 4 years ago
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆75Updated 2 years ago
- BurpSuite using the document and some extensions☆69Updated 4 years ago
- A burpsuite extension that helps security researchers find public security reports published on h1 based on the selected host☆42Updated 5 years ago
- Posts about different topics☆36Updated last year
- An automated, reliable scanner for the Log4Shell (CVE-2021-44228) vulnerability.☆43Updated 4 months ago
- A natural evolution of Burp Suite's Repeater tool☆93Updated last year
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- Searching for virtual hosts among non-resolvable domains☆88Updated 5 years ago
- ☆90Updated 3 years ago
- Dictionary cracking tool for HTTP Digest challenge/response hashes☆30Updated 2 years ago
- Contains all my research and content produced regarding the log4shell vulnerability☆31Updated 3 years ago
- To help you go through the pentesting phases and the tools each phase can have. Some pratical examples of the tools are present too.☆47Updated 6 years ago
- ☆67Updated 6 years ago
- User enumeration and password spraying tool for testing Azure AD☆70Updated 3 years ago
- NotSoCereal: A Deserialization exploit playground☆52Updated 3 years ago
- ☆23Updated 2 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆71Updated 3 years ago