A3sal0n / FalconGateLinks
A smart gateway to stop cyber criminals - Sponsored by Falcon Guard
☆254Updated 2 years ago
Alternatives and similar repositories for FalconGate
Users that are interested in FalconGate are comparing it to the libraries listed below
Sorting:
- How often does your password appear in the Pwned Passwords database? Uses the k-anonymity API.☆153Updated 4 years ago
- Protect your Wireless Network from Evil Access Points!☆183Updated 2 years ago
- Neet - Network Enumeration and Exploitation Tool☆168Updated 8 years ago
- Web Sight Docker Deployment☆122Updated 7 years ago
- ☆155Updated 7 years ago
- Repo for autosnort scripts.☆157Updated 5 years ago
- Visualize statistics from a Kippo SSH honeypot☆134Updated 2 years ago
- Simulates enough of a Telnet connection in order to log failed login attempts.☆244Updated 8 years ago
- Scripts to create your own MITM'ing, packet sniffing WiFi access point☆145Updated 10 years ago
- A powerful and extensible wireless drop box☆267Updated 6 years ago
- Next Generation Firewall Audit and Bypass Tool☆265Updated 8 years ago
- Mercure is a tool for security managers who want to train their colleague to phishing.☆268Updated 4 years ago
- Transparent network tap☆119Updated 10 years ago
- Linux vulnerability scanner based on Salt Open and Vulners audit API, with Slack notifications and JIRA integration☆263Updated 7 years ago
- WANNAFIX is a mitigation script for the recent WANNACRY Ransomware attack☆52Updated 6 years ago
- This script communicates with the Nessus API in an attempt to help with automating scans. Depending on the flag issued with the script, y…☆214Updated 5 years ago
- Foxhound: Blackbox - A Raspberry Pi NSM☆37Updated 7 years ago
- usbWatchdog - monitor changes to your usb ports, and if anything is plugged in or removed, wipe RAM and shut down.☆49Updated 8 years ago
- Stargate☆95Updated 9 years ago
- Detect and prevent KRACK attacks in your network☆182Updated 7 years ago
- Detect silent (unwanted) changes to files on your system☆160Updated 5 years ago
- A rogue-USB-device defeat program for Windows.☆189Updated 3 years ago
- pastebin.com Content Monitoring Tool☆194Updated 12 years ago
- Capturing, analysing and responding to cyber attacks☆171Updated last year
- Pentesters spend too much time during information gathering phase. Flashlight (Fener) provides services to scan network/ports and gather …☆190Updated 6 years ago
- A webshell framework for penetration testers.☆299Updated 2 months ago
- Simple website to display the LAN status based on a nmap scan☆58Updated 2 years ago
- The Shared Host Integrated Password System (SHIPS) is a solution to provide unique and rotated local super user or administrator password…☆128Updated 7 years ago
- Parse nmap's XML output files and insert them into an SQLite database☆119Updated 5 years ago
- Automatic firewall rule orchestator.☆83Updated 8 years ago