Designed to be installed on a fresh install of raspbian on a raspberry pi, by combining Respounder (Responder detection) and Artillery (port and service spoofing) for network deception, this tool allows you to detect an attacker on the network quickly by weeding out general noisy alerts with only those that matter.
☆34Nov 9, 2019Updated 6 years ago
Alternatives and similar repositories for Bootsy
Users that are interested in Bootsy are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This script provides a Python library with methods to authenticate to various sources of threat intelligence and query IPs for the latest…☆18Feb 16, 2025Updated last year
- .NET tool for enumeration processes and dumping memory.☆57Apr 4, 2019Updated 7 years ago
- SSL certificate authority script package for creating and signing your own SSL/TLS certificates☆11Nov 28, 2025Updated 4 months ago
- ☆16Jul 5, 2017Updated 8 years ago
- Automatic Sender Policy Framework Reconnaissance☆19Jul 9, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- This script will generate hashes (MD5, SHA1, SHA256), submit the MD5 to Virus Total, and produce a text file with the results.☆15Jul 13, 2023Updated 2 years ago
- A simple fuzzy matching set for python strings☆10Nov 25, 2024Updated last year
- WEFTools☆14Apr 30, 2020Updated 5 years ago
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Jul 23, 2020Updated 5 years ago
- \ PowerAvails Powershell /☆10Jun 30, 2018Updated 7 years ago
- The CRIME and BREACH Attacks work against SSL and HTTP Compression. They leverage specific properties of used compression functions and c…☆17Dec 29, 2013Updated 12 years ago
- VueTeams is a component for integrating Microsoft Teams channel into your own project, based on Vue, BootstrapVue, Microsoft Authenticati…☆11Aug 31, 2023Updated 2 years ago
- Ansible playbook to convert Sigma rules to ElastAlert rules☆10Feb 5, 2021Updated 5 years ago
- Harness the security superpowers of your cloud asset inventory☆11Sep 22, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆14Jul 13, 2020Updated 5 years ago
- ☆26Sep 29, 2018Updated 7 years ago
- PGPCrack-NG is a program designed to brute-force symmetrically encrypted PGP files. It is a replacment for the long dead PGPCrack.☆24Oct 30, 2017Updated 8 years ago
- CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.☆34Dec 19, 2021Updated 4 years ago
- ☆53May 21, 2018Updated 7 years ago
- Scripts to automate standing up apache2 with mod_rewrite in front of C2 servers.☆47Feb 17, 2021Updated 5 years ago
- Simple Ansible playbook and role for setting a software channel and upgrading RouterOS on mikrotik devices☆12Aug 1, 2022Updated 3 years ago
- ☆28Jun 12, 2017Updated 8 years ago
- Simple CLI utility to save off an image from every webcam hooked into a mac☆14May 20, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Kill Chain Matrix -->>☆38Jun 17, 2019Updated 6 years ago
- Additional Resources to improve Customer Experience with Azure Advanced Threat Protection☆22Jun 12, 2023Updated 2 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Oct 23, 2016Updated 9 years ago
- A complete, reliable, secure and open source webapp based on zero-knowledge encryption to deal with TOTP☆21Updated this week
- Sign-in a user with the Microsoft Identity Platform and call an ASP.NET web API that calls a downstream Web API with Conditional Access☆16Jan 6, 2023Updated 3 years ago
- ☆16Mar 29, 2026Updated 2 weeks ago
- Epimitheus is a tool that uses graphical database Neo4j for Windows Events visualization.☆19Mar 13, 2022Updated 4 years ago
- A virtual MediaWiki development environment, built on Vagrant, VirtualBox, and Puppet.☆16Dec 1, 2016Updated 9 years ago
- Catalog Red Team techniques that cause popups in various macOS versions☆15Nov 18, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Template for MkDocs Material☆11Jan 1, 2026Updated 3 months ago
- BloodHound Cypher Queries Ported to a Jupyter Notebook☆53Jun 20, 2020Updated 5 years ago
- ircollect☆31Aug 7, 2013Updated 12 years ago
- Defcon 28 - Red Team Village - Applied Purple Teaming - Why Can't We Be Friends☆26Aug 9, 2020Updated 5 years ago
- Scripts to threat optics stack quickly / abbreviated and automated. Run after APT-Lab-Terraform☆13Oct 24, 2020Updated 5 years ago
- This is an automated script to scan for Log4J vulnerabilities. This is based off of the Datto script.☆14Dec 17, 2021Updated 4 years ago
- ☆30Nov 15, 2018Updated 7 years ago