Designed to be installed on a fresh install of raspbian on a raspberry pi, by combining Respounder (Responder detection) and Artillery (port and service spoofing) for network deception, this tool allows you to detect an attacker on the network quickly by weeding out general noisy alerts with only those that matter.
☆35Nov 9, 2019Updated 6 years ago
Alternatives and similar repositories for Bootsy
Users that are interested in Bootsy are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This script provides a Python library with methods to authenticate to various sources of threat intelligence and query IPs for the latest…☆18Feb 16, 2025Updated last year
- SSL certificate authority script package for creating and signing your own SSL/TLS certificates☆11Nov 28, 2025Updated 5 months ago
- ☆16Jul 5, 2017Updated 8 years ago
- Orchestrate gatherer, scanner, saver, and trustymail_reporter☆21Apr 22, 2026Updated last month
- Technical Notes☆16Dec 1, 2017Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- dns logger for passive dns collection☆42May 27, 2012Updated 13 years ago
- Automatic Sender Policy Framework Reconnaissance☆19Jul 9, 2018Updated 7 years ago
- This script will generate hashes (MD5, SHA1, SHA256), submit the MD5 to Virus Total, and produce a text file with the results.☆15Jul 13, 2023Updated 2 years ago
- collection template ref implementation☆11Mar 13, 2025Updated last year
- A simple fuzzy matching set for python strings☆10Nov 25, 2024Updated last year
- Swift code to parse the quarantine history database, Chrome history database, Safari history database, and Firefox history database on ma…☆16Dec 3, 2020Updated 5 years ago
- WEFTools☆14Apr 30, 2020Updated 6 years ago
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Jul 23, 2020Updated 5 years ago
- Identify common attack paths to get Domain Administrator☆21Aug 20, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A module apply registry keys using LGPO instead☆13Apr 23, 2023Updated 3 years ago
- An analytical framework for network traffic and behavioral analytics☆22Feb 23, 2023Updated 3 years ago
- The CRIME and BREACH Attacks work against SSL and HTTP Compression. They leverage specific properties of used compression functions and c…☆17Dec 29, 2013Updated 12 years ago
- Ansible playbook to convert Sigma rules to ElastAlert rules☆10Feb 5, 2021Updated 5 years ago
- Harness the security superpowers of your cloud asset inventory☆11Sep 22, 2024Updated last year
- ☆14Jul 13, 2020Updated 5 years ago
- ☆26Sep 29, 2018Updated 7 years ago
- PGPCrack-NG is a program designed to brute-force symmetrically encrypted PGP files. It is a replacment for the long dead PGPCrack.☆24Oct 30, 2017Updated 8 years ago
- CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.☆34Dec 19, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- simple demo of using C# & System.Management.Automation.dll to run powershell code (b64 encoded) without powershell.exe☆14Mar 29, 2017Updated 9 years ago
- ☆53May 21, 2018Updated 8 years ago
- PowerShell module that uses Cloud Communications Graph API calls to manage and report on Microsoft Teams.☆13May 3, 2024Updated 2 years ago
- Simple Ansible playbook and role for setting a software channel and upgrading RouterOS on mikrotik devices☆12Aug 1, 2022Updated 3 years ago
- Additional Resources to improve Customer Experience with Azure Advanced Threat Protection☆22Jun 12, 2023Updated 2 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Oct 23, 2016Updated 9 years ago
- A complete, reliable, secure and open source webapp based on zero-knowledge encryption to deal with TOTP☆21Updated this week
- ☆16May 15, 2026Updated last week
- Epimitheus is a tool that uses graphical database Neo4j for Windows Events visualization.☆19Mar 13, 2022Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Catalog Red Team techniques that cause popups in various macOS versions☆15Nov 18, 2024Updated last year
- Template for MkDocs Material☆11Jan 1, 2026Updated 4 months ago
- BloodHound Cypher Queries Ported to a Jupyter Notebook☆53Jun 20, 2020Updated 5 years ago
- Defcon 28 - Red Team Village - Applied Purple Teaming - Why Can't We Be Friends☆26Aug 9, 2020Updated 5 years ago
- Scripts to threat optics stack quickly / abbreviated and automated. Run after APT-Lab-Terraform☆13Oct 24, 2020Updated 5 years ago
- This is an automated script to scan for Log4J vulnerabilities. This is based off of the Datto script.☆14Dec 17, 2021Updated 4 years ago
- ☆30Nov 15, 2018Updated 7 years ago