BBVA / idsfree
Launch hacking tests in cloud providers securely, isolated and without raise security alerts in the provider
☆15Updated 6 years ago
Related projects: ⓘ
- ☆42Updated this week
- Exfiltration Framework - Exfiltration modeling tool written in Python. Naisho attempts to avoid detection from DLP, IPS/IDS egress filter…☆37Updated 9 years ago
- ☆27Updated this week
- Tools to interact with a certificate transparency server☆22Updated 9 years ago
- A better SSL cipher checker using gnutls☆27Updated 7 years ago
- The knife of the Admin & Security auditor☆42Updated 4 years ago
- Troje is a honeypot built around lxc containers. It will run each connection with the service within a seperate lxc container.☆43Updated 10 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆55Updated 9 years ago
- Advanced HTTP fingerprinting PoC☆44Updated 7 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆31Updated 8 years ago
- Data exfiltration PoC scripts☆23Updated 9 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 8 years ago
- Extract, defang, resolve names and IPs from text☆22Updated 8 months ago
- More Obvious Webmalware Repository☆15Updated 7 years ago
- Using osquery for Mass Incident Detection & Response☆18Updated 8 years ago
- tundeep☆42Updated 5 years ago
- huawei mac2wepkey scanner☆16Updated 11 years ago
- CVE-Search Management Tools - Tools that might be useful for management purposes☆22Updated 8 years ago
- Lair Framework dockerized.☆37Updated 3 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆79Updated 11 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Updated 9 months ago
- REST API test utility☆24Updated 4 years ago
- ☆12Updated this week
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆17Updated 10 years ago
- ☆12Updated this week
- Fingerprint a web app using local files as the fingerprint sources☆36Updated 7 years ago
- ☆26Updated 7 years ago
- Flexible framework that allows automation to process cyber threat information and update endpoint defense tools.☆21Updated 5 years ago
- This repository is a curated list of pro bono incident response entities.☆19Updated last year