HIBC2017 / WANNAFIXLinks
WANNAFIX is a mitigation script for the recent WANNACRY Ransomware attack
☆52Updated 6 years ago
Alternatives and similar repositories for WANNAFIX
Users that are interested in WANNAFIX are comparing it to the libraries listed below
Sorting:
- Repo for autosnort scripts.☆158Updated 4 years ago
- Kerberos / Windows AD / Linux PAM password change check against breached lists (HIBP), and other rules☆160Updated 2 years ago
- analyze a web-based network traffic 🕶 to detect central command and control servers☆79Updated 7 years ago
- pastebin.com Content Monitoring Tool☆194Updated 12 years ago
- Snort rules to detect local malware, phishing, and adult content by inspecting DNS responses from OpenDNS☆52Updated 8 years ago
- ☆48Updated 9 years ago
- Interactive remote PowerShell Payload☆77Updated 9 years ago
- Herramienta escrita en Python y utilizando la librería Scapy basada en Yersinia para la implementación de ataques de capa de enlace de da…☆60Updated 5 years ago
- ☆141Updated last year
- MS17-010 Windows SMB RCE -- Full subnet scanner☆24Updated 8 years ago
- The Stratosphere IPS is a free software IPS that uses network behavior to detect and block malicious actions.☆33Updated 9 years ago
- Removed according to regulations☆35Updated 8 years ago
- A powershell script for creating a Windows honeyport.☆89Updated 3 months ago
- Detect silent (unwanted) changes to files on your system☆162Updated 5 years ago
- Computer Network Defender's Toolkit, specializing in active defense techniques.☆7Updated 5 years ago
- Windows PowerShell domain scanning tool☆54Updated 9 years ago
- Visualize statistics from a Kippo SSH honeypot☆134Updated 2 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Updated 8 years ago
- The Shared Host Integrated Password System (SHIPS) is a solution to provide unique and rotated local super user or administrator password…☆128Updated 7 years ago
- Honeypot (Dionaea and kippo) setup script☆84Updated 8 years ago
- Smoking Linux Every Day!☆54Updated 5 years ago
- Schillings SwordPhish empowers organisations and engages its employees to establish the key component of any cyber security strategy: th…☆107Updated 7 years ago
- VirusTotal tools☆91Updated 4 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago
- Veil Catapult is no longer supported☆76Updated 9 years ago
- AutoBrowser Screenshot☆49Updated 8 years ago
- A collection of post-exploitation tools for network red teaming.☆138Updated 6 years ago
- Neet - Network Enumeration and Exploitation Tool☆167Updated 8 years ago
- A tool to generate graph and other output from NMAP XML files☆116Updated 6 years ago
- A Windows priviledge escalation tool (abusing race conditions)☆79Updated 9 years ago