Pinned Repositories
3klCon
Automation Recon tool which works with Large & Medium scopes. It performs more than 20 tasks and gets back all the results in separated files.
awesome-burp-extensions
A curated list of amazingly awesome Burp Extensions
awesome-k8s-security
A curated list for Awesome Kubernetes Security resources
Cobalt-Strike-CheatSheet
Some notes and examples for cobalt strike's functionality
GRASSMARLIN
Provides situational awareness of Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) networks in support of network security assessments. #nsacyber
IntelOwl
Intel Owl: analyze files, domains, IPs in multiple ways from a single API at scale
jwt_tool
:snake: A toolkit for testing, tweaking and cracking JSON Web Tokens
kubesploit
Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized environments.
rengine
reNgine is a reconnaissance engine(framework) that does end-to-end reconnaissance with the help of highly configurable scan engines and does information gathering about the target web application. reNgine makes use of various open-source tools and makes a configurable pipeline of reconnaissance.
ThreatMapper
Identify vulnerabilities in running containers, images, hosts and repositories
Acemampz's Repositories
Acemampz/kubesploit
Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized environments.
Acemampz/rengine
reNgine is a reconnaissance engine(framework) that does end-to-end reconnaissance with the help of highly configurable scan engines and does information gathering about the target web application. reNgine makes use of various open-source tools and makes a configurable pipeline of reconnaissance.
Acemampz/ThreatMapper
Identify vulnerabilities in running containers, images, hosts and repositories
Acemampz/3klCon
Automation Recon tool which works with Large & Medium scopes. It performs more than 20 tasks and gets back all the results in separated files.
Acemampz/awesome-burp-extensions
A curated list of amazingly awesome Burp Extensions
Acemampz/awesome-k8s-security
A curated list for Awesome Kubernetes Security resources
Acemampz/Cobalt-Strike-CheatSheet
Some notes and examples for cobalt strike's functionality
Acemampz/GRASSMARLIN
Provides situational awareness of Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) networks in support of network security assessments. #nsacyber
Acemampz/IntelOwl
Intel Owl: analyze files, domains, IPs in multiple ways from a single API at scale
Acemampz/jwt_tool
:snake: A toolkit for testing, tweaking and cracking JSON Web Tokens
Acemampz/kubestriker
A Blazing fast Security Auditing tool for Kubernetes
Acemampz/opencti
Open Cyber Threat Intelligence Platform
Acemampz/Osmedeus
Fully automated offensive security framework for reconnaissance and vulnerability scanning
Acemampz/PowerShellArmoury
A PowerShell armoury for penetration testers or other random security guys
Acemampz/Red-Teaming-Toolkit
A collection of open source and commercial tools that aid in red team operations.
Acemampz/siembol-config
A Siembol configuration repository for a Siembol quickstart demo
Acemampz/trivy
Scanner for vulnerabilities in container images, file systems, and Git repositories, as well as for configuration issues
Acemampz/Web-Pentesting
Acemampz/wfuzz
Web application fuzzer
Acemampz/AD-Tools-Pentest-HTB
Tools which can be used to pentest AD
Acemampz/Directory_Important_files
Code segregates the files based on filetype and gives a brief description on what could me found in them.
Acemampz/find_comments
finds comments in a web page
Acemampz/url_extractor
extracts the url from a file, we can specify hoe the url starts and how it ends