Exploitation Framework for Embedded Devices
-
Updated
Apr 14, 2024 - Python
Exploitation Framework for Embedded Devices
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
Web path scanner
Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.
Nishang - Offensive PowerShell for red team, penetration testing and offensive security.
reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous monitoring, backed by a database, and simple yet intuitive User Interface. reNgine makes it easy for penetration testers to gather reconnaissance with…
⬆️ ☠️ 🔥 Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock
Gather and update all available and newest CVEs with their PoC.
🔥 Web-application firewalls (WAFs) from security standpoint.
All about bug bounty (bypasses, payloads, and etc)
An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
🔍 A collection of interesting, funny, and depressing search queries to plug into shodan.io 👩💻
ffffffff0x 团队维护的安全知识框架,内容包括不仅限于 web安全、工控安全、取证、应急、蓝队设施部署、后渗透、Linux安全、各类靶机writup
A curated list of awesome infosec courses and training resources.
Add a description, image, and links to the infosec topic page so that developers can more easily learn about it.
To associate your repository with the infosec topic, visit your repo's landing page and select "manage topics."