0x68302A / merOS-virtLinks
Build and Interact with a Set of Virtual Machines
☆15Updated 2 weeks ago
Alternatives and similar repositories for merOS-virt
Users that are interested in merOS-virt are comparing it to the libraries listed below
Sorting:
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Updated 3 years ago
- Scans for HTTP servers and finds given strings in HTTP body and HTTP response headers.☆36Updated 6 months ago
- Tool useful to discover services behind unknown ports☆13Updated 4 years ago
- ☆19Updated 13 years ago
- module for certexfil☆15Updated 3 years ago
- smtp-user-enum.pl ported into a recon-ng module.☆9Updated 11 years ago
- This repository contains additional files mentioned in the blog post☆22Updated 6 years ago
- ☆9Updated 4 years ago
- HttpDoom is a tool for response-based inspection of websites across a large amount of hosts for quickly gaining an overview of HTTP-base…☆23Updated 3 years ago
- Metasploit modules, powershell scripts and custom exploit to perform local privilege escalation on windows systems.☆11Updated 8 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆40Updated 9 years ago
- A private botnet using multiple cloud environments for pentesters and red teamers. - Built by the community during a hackathon at the WWH…☆9Updated 6 years ago
- Decrypt encrypted SonicOSX firmware images☆16Updated 4 months ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆13Updated 4 years ago
- Automatic generator of YARA modules based in protocol buffers☆16Updated 5 months ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 7 months ago
- Forensics triage tool relying on Volatility and Foremost☆26Updated last year
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆18Updated 7 years ago
- The official command line client for IPFinder☆11Updated 6 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆52Updated 4 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Updated 4 years ago
- Capturing audio (.wav) from target using a link☆14Updated 5 years ago
- Malkom is an extensible and simple similarity graph generator for malware analysis aimed at helping analysts visualize and cluster sets o…☆16Updated 2 years ago
- A collection of malware samples caught by DIONAEA Honeypot☆11Updated 6 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆9Updated 8 years ago
- Collection of malware ioc hashes from blog posts. A Python script is provided to search through it.☆17Updated 4 years ago
- Bash script to automate the installation and buildouts of OpenVPN servers and clients.☆6Updated 12 years ago
- Static Binary Deployer. Download and deploy *Nix utilities on a compromised system.☆28Updated 5 years ago
- A FreeBSD kernel rootkit.☆15Updated 5 years ago