Linux and Windows Hardening Points
☆12Mar 6, 2018Updated 7 years ago
Alternatives and similar repositories for LWHP
Users that are interested in LWHP are comparing it to the libraries listed below
Sorting:
- Pastenum is a text dump enumeration tool.☆14Dec 9, 2013Updated 12 years ago
- ☆22May 20, 2016Updated 9 years ago
- A better SSL cipher checker using gnutls☆28May 17, 2017Updated 8 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- Ruby Oracle Security Scanner☆16Jul 9, 2012Updated 13 years ago
- Security tools to use on assessments.☆40May 9, 2016Updated 9 years ago
- Various fuzzers written in Python. Currently has a TCP server for fuzzing client software, and a CLI fuzzer to use against programs ran f…☆11Feb 14, 2018Updated 8 years ago
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- Notes on Active Directory analysis and exploitation☆11Mar 7, 2019Updated 6 years ago
- Tools to work with vulnerability standards.☆19Mar 19, 2014Updated 11 years ago
- ☆32Jun 3, 2019Updated 6 years ago
- Battalion is a tool used to automate reconnaissance and assist both pentesters and internal security/admin teams.☆43Jan 13, 2026Updated last month
- Nohidy the system admins best friend, multi platform auditing tool☆14Feb 6, 2018Updated 8 years ago
- Find a useable IP address to use☆30Jul 4, 2014Updated 11 years ago
- ☆13Oct 29, 2014Updated 11 years ago
- RSYaba Modular Brute Force Attacker☆19Jun 2, 2014Updated 11 years ago
- Easy to use command line security scanner☆58Feb 27, 2016Updated 10 years ago
- Arp spoof detection tool☆26Jun 30, 2017Updated 8 years ago
- Phactive - Monitoring an Environment with Nmap red teaming☆12May 11, 2019Updated 6 years ago
- CHEF cookbook for automating provisioning of CTF competition and wargame challenge platforms☆12Jan 5, 2016Updated 10 years ago
- Hand list of Powershell commands frequently used during penetration tests☆15Oct 14, 2018Updated 7 years ago
- Simulates a logged in user.☆16Jul 10, 2024Updated last year
- LibreSSL with a backdoor in RSA key generation☆17Jun 26, 2016Updated 9 years ago
- Exploit Reliability Testing System☆35Apr 24, 2015Updated 10 years ago
- Just a place to share some things I've written while participating in Hack The Box.☆18Jun 5, 2020Updated 5 years ago
- Proof of concept for vulnerability management of Docker containers☆16May 4, 2017Updated 8 years ago
- Passive DHCP analyzer with OS fingerprinting on the LAN through DHCP☆13Nov 16, 2017Updated 8 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- Writeups for various crackmes, CTFs, wargames, etc.☆15Apr 21, 2017Updated 8 years ago
- ☆11Feb 20, 2015Updated 11 years ago
- Prometheus Firewall Analyzer☆48May 1, 2015Updated 10 years ago
- Custom scripts used during the scenario☆21Apr 5, 2021Updated 4 years ago
- buffer overflow examples☆23Dec 20, 2017Updated 8 years ago
- An implementation of jpnevulator in Python☆21Jan 30, 2018Updated 8 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆31Nov 7, 2016Updated 9 years ago
- Golang实现的x86下的Meterpreter reverse tcp☆39Feb 23, 2020Updated 6 years ago
- Scan for and exploit Consul agents☆39Jun 11, 2019Updated 6 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Jun 4, 2013Updated 12 years ago
- List of default passwords for Industrial Control Systems☆79Feb 28, 2017Updated 9 years ago