Ethical hacking tools and resources for penetration testing and red team operations. Task: Enumeration
Explore 7 curated tools and resources
A subdomain enumeration tool for penetration testers and security researchers.
A script to enumerate Google Storage buckets and determine access and privilege escalation
LinEnum is a tool for Linux enumeration that provides detailed system information and performs various checks and tasks.
A guide on basic Linux privilege escalation techniques including enumeration, data analysis, exploit customization, and trial and error.
A toolkit to attack Office365, including tools for password spraying, password cracking, token manipulation, and exploiting vulnerabilities in Office365 APIs and services.
A next generation version of enum4linux with enhanced features for enumerating information from Windows and Samba systems.
Weaponizing Kerberos protocol flaws for stealthy attacks on domain users.
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.
An AI-driven data classification and governance platform that automatically discovers, analyzes, and labels sensitive information while providing risk management and compliance capabilities.
An AI-powered platform that automates threat hunting and analysis by processing cyber threat intelligence and generating customized hunt packages for SOC teams.
Aikido is an all-in-one security platform that combines multiple security scanning and management functions for cloud-native applications and infrastructure.
Permiso is an Identity Threat Detection and Response platform that provides comprehensive visibility and protection for identities across multiple cloud environments.
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.