Boran / lusas
Linux/Unix Security Auditing Scripts: Lusas
☆21Updated 7 years ago
Alternatives and similar repositories for lusas:
Users that are interested in lusas are comparing it to the libraries listed below
- Collect hashes password hashes for cracking☆31Updated 11 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 6 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 8 years ago
- Traceroute improved wrapper for CSIRT and CERT operators☆37Updated 3 months ago
- An active domain name query tool to help keep track of domain name movements...☆15Updated 3 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 3 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆41Updated 4 years ago
- Bash scripts to help setup port redirects with iptables☆16Updated 7 years ago
- dns logger for passive dns collection☆42Updated 12 years ago
- Discover potential timestamps within the Windows Registry☆18Updated 10 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Updated 4 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Passive Network Audit Framework☆32Updated 6 years ago
- Megatron - A System for Abuse- and Incident Handling☆42Updated 7 years ago
- API to access the Redis database of a BGP Ranking instance.☆17Updated 7 years ago
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Updated 7 years ago
- Custom scripts used during the scenario☆21Updated 3 years ago
- Spam trap management☆23Updated 7 months ago
- Yet-Another-BlueTeam-Repo-YABTR. A Repo for a collection of FREE Blue team tools for both windows and Linux.. Not vendor buy to defend pr…☆2Updated 5 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 10 years ago
- Checkpoint Firewall Ruleset Auditor ( For the HTML exports when you do not have the object files )☆35Updated 7 years ago
- Weape-Wireless-EAP-Extractor☆26Updated 11 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Updated 5 years ago
- My collection of dockerfiles☆24Updated 8 years ago
- Plugins written for CVE-Search☆25Updated 3 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Updated 7 years ago
- Six Degrees of Domain Admin☆15Updated 7 years ago