xmpf / mindmaps
Mindmaps allow to organize and understand information faster and better.
☆2Updated 3 years ago
Alternatives and similar repositories for mindmaps:
Users that are interested in mindmaps are comparing it to the libraries listed below
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆75Updated 2 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆50Updated 4 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- ☆37Updated 3 years ago
- Enumerate AWS permissions and resources.☆67Updated 2 years ago
- Find the remote website version based on a git repository☆126Updated 3 years ago
- This script is a multi-threaded Okta password sprayer.☆70Updated last year
- Collaborative pentest tool with highly customizable tools☆71Updated 3 years ago
- ☆41Updated 2 years ago
- Merge multiple nMap xml files into one☆50Updated 5 years ago
- ☆90Updated 3 years ago
- ☆22Updated 4 years ago
- User enumeration and password spraying tool for testing Azure AD☆69Updated 2 years ago
- A burpsuite extension that helps security researchers find public security reports published on h1 based on the selected host☆42Updated 4 years ago
- ☆119Updated 2 years ago
- A compilation of network scanning strategies to find vulnerable devices☆74Updated 2 years ago
- Custom scripts for the PIPER Burp extensions.☆97Updated last year
- ☆65Updated 6 years ago
- ☆18Updated 2 years ago
- ☆93Updated 2 years ago
- A Burp Suite Extension for pentester and bug bounty hunters an to maintain checklist, map flows, write test cases and track vulnerabiliti…☆113Updated last year
- A collection of commands, scripts, tips, tricks, and other information compiled during my journey to obtaining the OSCP certification.☆23Updated 4 years ago
- Target practice for ffuf☆61Updated 3 years ago
- To help you go through the pentesting phases and the tools each phase can have. Some pratical examples of the tools are present too.☆46Updated 5 years ago
- Contains all my research and content produced regarding the log4shell vulnerability☆31Updated 3 years ago
- OSCP guide and Red Team assessment Guide☆35Updated 4 years ago
- Programmatically create hunting rules for deserialization exploitation with multiple keywords, gadget chains, object types, encodings, an…☆141Updated last year
- OSWE Preparation☆37Updated 5 years ago
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find ent…☆119Updated 2 years ago
- ☆27Updated last year