DiabloHorn / vysolator
vyos based isolation of networks
☆10Updated 4 years ago
Alternatives and similar repositories for vysolator:
Users that are interested in vysolator are comparing it to the libraries listed below
- Do the unexpected with AD GPO processing☆9Updated 5 years ago
- New version of the buildkit repository☆9Updated 2 years ago
- ☆20Updated 4 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Updated 4 years ago
- Analytics for Accounting logs from Network devices☆17Updated 4 years ago
- A Swift port of some of the original PersistentJXA projects by D00MFist. Original PersistentJXA repo: https://github.com/D00MFist/Persist…☆31Updated 3 years ago
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- ☆22Updated 4 years ago
- Ansible scripts to build an attack box☆22Updated 6 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Scans an internal network using massscan and nmap☆20Updated last year
- A PowerShell script to prevent Sysmon from writing its events☆15Updated 4 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- Microsoft Flow Attack Framework☆23Updated 5 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Fuzzer for finding Open Mail Relays☆14Updated 4 years ago
- Hostile Dropboxes Management☆26Updated 5 years ago
- A script to automate the creation of cloud infrastructure for hash cracking.☆16Updated 5 years ago
- An email client in CLI, designed specifically for spearphishing.☆13Updated 5 years ago
- Slides from my AD Privesc talk at WAHCKon 2017☆16Updated 7 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 4 months ago
- Nessus Preflight(NPF) Check for local and remote systems. Essentially sets three registry keys and restarts a service to allow nessus to …☆16Updated 4 years ago
- List (or plunder) private repos/gists to which a token has access, including those of other users☆11Updated 3 years ago
- Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests☆21Updated 7 years ago
- ☆11Updated 6 years ago
- Manticore's Public Threats Repository☆10Updated 4 years ago
- windows-operating-system-archaeology @Enigma0x3 @subTee☆45Updated 7 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- ☆15Updated 3 years ago