Boran / lusasLinks
Linux/Unix Security Auditing Scripts: Lusas
☆23Updated 8 years ago
Alternatives and similar repositories for lusas
Users that are interested in lusas are comparing it to the libraries listed below
Sorting:
- Simple Bash script to retrieve basic system information.☆30Updated 7 years ago
- Collect hashes password hashes for cracking☆31Updated 11 years ago
- Custom scripts used during the scenario☆21Updated 4 years ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆30Updated 6 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆42Updated 4 years ago
- Collection of single use scripts I worte for windows forensics☆27Updated 13 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆30Updated 6 years ago
- Express security essentials deployment for Linux Servers☆59Updated 4 years ago
- Digital Forensics and Incident Response Wiki☆40Updated 11 years ago
- Traceroute improved wrapper for CSIRT and CERT operators☆38Updated 9 months ago
- Yet-Another-BlueTeam-Repo-YABTR. A Repo for a collection of FREE Blue team tools for both windows and Linux.. Not vendor buy to defend pr…☆2Updated 6 years ago
- Docker container for datasploit framework☆26Updated 7 years ago
- hassh-utils: Nmap NSE Script and Docker image for HASSH - the SSH client/server fingerprinting method (https://github.com/salesforce/hass…☆58Updated 10 months ago
- Search the ExploitDB with a little more control☆21Updated 8 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Updated 7 years ago
- miscellaneous scripts and things...☆21Updated 9 years ago
- IPSec testing tool☆19Updated 9 months ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 4 years ago
- A multi-threaded Python tool to generate screenshot of websites☆31Updated 9 years ago
- DNS Enumeration and Reconnaissance Tool☆36Updated 9 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 8 years ago
- Shodan.io connector for Phantom Cyber Security Orchestration☆22Updated 8 years ago
- Automated install process for Phishing Frenzy☆24Updated 10 years ago
- Automated Security Assessment Reporting Tool☆37Updated 7 years ago
- Enumerate subdomains through Virustotal☆32Updated 5 years ago
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Updated 7 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- A place for scripts that describe web exploits to live so they can be used in testing☆20Updated 12 years ago
- Mattermost - Shodan Slash command☆31Updated 8 years ago
- Metasploit exploit suggester using OpenVAS XML output☆18Updated 7 years ago