- Italy
-
09:23
(UTC +01:00) - edoardottt.com
- in/edoardoottavianelli
Highlights
Lists (2)
Sort Name ascending (A-Z)
Starred repositories
CLI client (and Golang module) for deps.dev API. Free access to dependencies, licenses, advisories, and other critical health and security signals for open source package versions.
Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more
TryHackMe CTFs writeups, notes, drafts, scrabbles, files and solutions.
Discover new target domains using Content Security Policy
Information Gathering tool - DNS / Subdomains / Ports / Directories enumeration
Master of Science in Cybersecurity, Sapienza University of Rome.
Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)
BloodyAD is an Active Directory Privilege Escalation Framework
Customized Password/Passphrase List inputting Target Info
My code and notes for "From Day Zero to Zero Day", a book on vulnerability research by Eugene Lim.
Notes I took while preparing for eJPT certification by INE Security (passed 19/20, fka eLearn Security)
edoardottt / takeover
Forked from jaikishantulswani/takeoverSub-Domain TakeOver Vulnerability Scanner (edoardottt fork)
AirPods liberated from Apple's ecosystem.
A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more
Golang module exporting general purpose functions I get tired of rewriting every time
Highly customizable low-interaction experimental honeypot that mimics specific hosts.
Response Filter Denial of Service (RFDoS) Experimental Scanner
My experiments in weaponizing ONOS applications (https://github.com/opennetworkinglab/onos)
URL / IP / Email defanging with Javascript. Make IoC harmless.
Like and retweet your tweets, or search tweets by topic. It stores and serves data with a Flask webapp. 🐦 Live demo running on twitter.com/ai_testing
SSH server & client security auditing (banner, key exchange, encryption, mac, compression, compatibility, security, etc)
Take a list of domains, crawl urls and scan for endpoints, secrets, api keys, file extensions, tokens and more
The Most Advanced Client-Side Prototype Pollution Scanner
My useful files for penetration tests, security assessments, bug bounty and other security related stuff
Use favicons to improve your target recon phase. Quickly detect technologies, WAF, exposed panels, known services.
List of companies that hire security people full remote.