mirror of
https://github.com/The-Art-of-Hacking/h4cker.git
synced 2024-12-24 14:59:21 -05:00
Merge branch 'master' of https://github.com/The-Art-of-Hacking/h4cker
This commit is contained in:
commit
d018810cfb
@ -2,6 +2,7 @@
|
|||||||
The following are a collection of recently-released pen test tools. I update this list every time that there is a new post and when I find a new one around the Internet. The rest of the repository has hundreds of additional cybersecurity and pen test tools.
|
The following are a collection of recently-released pen test tools. I update this list every time that there is a new post and when I find a new one around the Internet. The rest of the repository has hundreds of additional cybersecurity and pen test tools.
|
||||||
|
|
||||||
----
|
----
|
||||||
|
- [AnonX - An Encrypted File Transfer Via AES-256-CBC](http://feedproxy.google.com/~r/PentestTools/~3/eXmPteIPVsk/anonx-encrypted-file-transfer-via-aes.html)
|
||||||
- [Strafer - A Tool To Detect Potential Infections In Elasticsearch Instances](http://feedproxy.google.com/~r/PentestTools/~3/CuDUC6e4sy0/strafer-tool-to-detect-potential.html)
|
- [Strafer - A Tool To Detect Potential Infections In Elasticsearch Instances](http://feedproxy.google.com/~r/PentestTools/~3/CuDUC6e4sy0/strafer-tool-to-detect-potential.html)
|
||||||
- [Turbo-Intruder - A Burp Suite Extension For Sending Large Numbers Of HTTP Requests And Analyzing The Results](http://feedproxy.google.com/~r/PentestTools/~3/qOe52cKAJ5c/turbo-intruder-burp-suite-extension-for.html)
|
- [Turbo-Intruder - A Burp Suite Extension For Sending Large Numbers Of HTTP Requests And Analyzing The Results](http://feedproxy.google.com/~r/PentestTools/~3/qOe52cKAJ5c/turbo-intruder-burp-suite-extension-for.html)
|
||||||
- [Lazy-RDP - Script For AutomRDPatic Scanning And Brute-Force](http://feedproxy.google.com/~r/PentestTools/~3/TWRiQVRk6uE/lazy-rdp-script-for-automrdpatic.html)
|
- [Lazy-RDP - Script For AutomRDPatic Scanning And Brute-Force](http://feedproxy.google.com/~r/PentestTools/~3/TWRiQVRk6uE/lazy-rdp-script-for-automrdpatic.html)
|
||||||
|
@ -23,7 +23,7 @@ Open-source intelligence (OSINT) is data collected from open source and publicly
|
|||||||
|
|
||||||
## The OSINT Framework
|
## The OSINT Framework
|
||||||
- [OSINT Framework](https://osintframework.com)
|
- [OSINT Framework](https://osintframework.com)
|
||||||
-
|
|
||||||
## Open Source Threat Intelligence
|
## Open Source Threat Intelligence
|
||||||
|
|
||||||
- [GOSINT](https://github.com/ciscocsirt/gosint) - a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs). GOSINT allows a security analyst to collect and standardize structured and unstructured threat intelligence.
|
- [GOSINT](https://github.com/ciscocsirt/gosint) - a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs). GOSINT allows a security analyst to collect and standardize structured and unstructured threat intelligence.
|
||||||
@ -110,7 +110,7 @@ WHOIS information is based upon a tree hierarchy. ICANN (IANA) is the authoritat
|
|||||||
- [OnionIngestor](https://github.com/danieleperera/OnionIngestor)
|
- [OnionIngestor](https://github.com/danieleperera/OnionIngestor)
|
||||||
|
|
||||||
### Other Great Intelligence Gathering Sources and Tools
|
### Other Great Intelligence Gathering Sources and Tools
|
||||||
* Resources from Pentest-standard.org - http://www.pentest-standard.org/index.php/PTES_Technical_Guidelines#Intelligence_Gathering
|
- Resources from Pentest-standard.org - http://www.pentest-standard.org/index.php/PTES_Technical_Guidelines#Intelligence_Gathering
|
||||||
|
|
||||||
### Active Recon
|
### Active Recon
|
||||||
* Tons of references to scanners and vulnerability management software for active reconnaissance - http://www.pentest-standard.org/index.php/PTES_Technical_Guidelines#Vulnerability_Analysis
|
- Tons of references to scanners and vulnerability management software for active reconnaissance - http://www.pentest-standard.org/index.php/PTES_Technical_Guidelines#Vulnerability_Analysis
|
||||||
|
Loading…
Reference in New Issue
Block a user