DiabloHorn / vysolatorLinks
vyos based isolation of networks
☆10Updated 4 years ago
Alternatives and similar repositories for vysolator
Users that are interested in vysolator are comparing it to the libraries listed below
Sorting:
- A PowerShell script to prevent Sysmon from writing its events☆15Updated 5 years ago
- ☆20Updated 4 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Updated 3 years ago
- Fuzzer for finding Open Mail Relays☆14Updated 4 years ago
- Do the unexpected with AD GPO processing☆9Updated 6 years ago
- Ansible scripts to build an attack box☆23Updated 6 years ago
- ☆22Updated 4 years ago
- Analytics for Accounting logs from Network devices☆17Updated 4 years ago
- A Canary which fires when uninstalled☆34Updated 4 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- Toolkit to detected abnormal activities on a Windows machine.☆11Updated 9 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Updated 4 years ago
- Duo MFA auditing tool to test users' likelihood of approving unexpected push notifications☆13Updated 7 years ago
- Manticore's Public Threats Repository☆10Updated 4 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- A collection of scripts for the purpose of gathering open source intelligence, to be presented at GrayHat, BSides Denver, and Information…☆25Updated 4 years ago
- introduction to distributed scanning using vultr☆11Updated 8 years ago
- A Swift port of some of the original PersistentJXA projects by D00MFist. Original PersistentJXA repo: https://github.com/D00MFist/Persist…☆32Updated 4 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- module for certexfil☆15Updated 2 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Updated last year
- Hostile Dropboxes Management☆26Updated 5 years ago
- Forked and updated with some additional features over the original☆17Updated 4 years ago
- Next Generation Phishing Tool For Internal / Red Teams☆35Updated 5 years ago
- Docker container for datasploit framework☆26Updated 7 years ago
- List (or plunder) private repos/gists to which a token has access, including those of other users☆11Updated 3 years ago
- Exfiltration based on custom X509 certificates☆26Updated last year
- ARDvark parses the Apple Remote Desktop (ARD) files to pull out application usage, user activity, and filesystem listings.☆35Updated last year
- Slides from my AD Privesc talk at WAHCKon 2017☆16Updated 8 years ago
- Working through Practical Malware Analysis from No Starch Press☆13Updated 8 years ago