- Italy
-
12:42
(UTC +01:00) - edoardottt.com
- in/edoardoottavianelli
Highlights
Lists (2)
Sort Name ascending (A-Z)
Starred repositories
My experiments in weaponizing ONOS applications (https://github.com/opennetworkinglab/onos)
URL / IP / Email defanging with Javascript. Make IoC harmless.
An extremely fast Python package and project manager, written in Rust.
Dominate Active Directory with PowerShell.
Like and retweet your tweets, or search tweets by topic. It stores and serves data with a Flask webapp. 🐦 Live demo running on twitter.com/ai_testing
SSH server & client security auditing (banner, key exchange, encryption, mac, compression, compatibility, security, etc)
Information Gathering tool - DNS / Subdomains / Ports / Directories enumeration
edoardottt / takeover
Forked from jaikishantulswani/takeoverSub-Domain TakeOver Vulnerability Scanner (edoardottt fork)
Master of Science in Cybersecurity, Sapienza University of Rome.
Take a list of domains, crawl urls and scan for endpoints, secrets, api keys, file extensions, tokens and more
Customized Password/Passphrase List inputting Target Info
The Most Advanced Client-Side Prototype Pollution Scanner
My useful files for penetration tests, security assessments, bug bounty and other security related stuff
Use favicons to improve your target recon phase. Quickly detect technologies, WAF, exposed panels, known services.
List of companies that hire security people full remote.
Notes I took while preparing for eJPT certification by INE Security (passed 19/20, fka eLearn Security)
For developers, who are building real-time data-driven applications, Redis is the preferred, fastest, and most feature-rich cache, data structure server, and document and vector query engine.
CompTIA Security+ SY0-601 notes (passed 788 points)
CLI client (and Golang module) for deps.dev API. Free access to dependencies, licenses, advisories, and other critical health and security signals for open source package versions.
Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more
Highly customizable low-interaction experimental honeypot that mimics specific hosts.
A collection of Azure AD/Entra tools for offensive and defensive security purposes