LUTECH-TMS-CERT / EHAT-NGView external linksLinks
Lutech TMS EHAT-NG
☆14Jul 8, 2017Updated 8 years ago
Alternatives and similar repositories for EHAT-NG
Users that are interested in EHAT-NG are comparing it to the libraries listed below
Sorting:
- Tinkering with bits and bytes☆11Dec 14, 2024Updated last year
- littleoldearthquake☆12Jul 15, 2014Updated 11 years ago
- An updated version of the cryptolocked (anti-ransomware) toolkit. Adds new features such as the hunter module.☆11Mar 29, 2017Updated 8 years ago
- Office 365 MFA capture toolkit☆14Aug 3, 2017Updated 8 years ago
- Proof of concept tool used for phishing multi-factor authentication on O365☆14Aug 8, 2018Updated 7 years ago
- Checks observables/ioc in TheHive/Cortex against the MISP warningslists☆14Dec 27, 2017Updated 8 years ago
- Mainframe bruter and screen automation utility.☆43Sep 28, 2014Updated 11 years ago
- ☆23Mar 11, 2014Updated 11 years ago
- Random Code☆25Apr 18, 2011Updated 14 years ago
- Python tools for IOC (Indicator of Compromise) handling☆96Nov 25, 2021Updated 4 years ago
- Weape-Wireless-EAP-Extractor☆29Sep 1, 2013Updated 12 years ago
- Hostile Dropboxes Management☆26Jan 8, 2020Updated 6 years ago
- Home to the ActorTrackr source code☆24Jun 21, 2017Updated 8 years ago
- Scripts to prepare Windows system for debugging.☆31Jan 5, 2021Updated 5 years ago
- A small wriiteup and a PoC tool about how to use SO_REUSADDR for firewall evasion☆27Dec 8, 2015Updated 10 years ago
- Metasploit Framework☆25Jan 12, 2020Updated 6 years ago
- ☆75Aug 29, 2014Updated 11 years ago
- Simple development DNS server written in python☆26Dec 19, 2017Updated 8 years ago
- B-Sides CBR 2018 talk about group policy and Grouper☆38May 3, 2019Updated 6 years ago
- ☆30Aug 8, 2015Updated 10 years ago
- Active Directory enumeration from non-domain system.☆118Dec 15, 2016Updated 9 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Oct 17, 2016Updated 9 years ago
- C# code for Transferring Backdoor Payloads by ICMPv4 Traffic and bypassing Anti-Viruses☆29Jun 6, 2023Updated 2 years ago
- Executes PowerShell from an unmanaged process☆29Dec 15, 2014Updated 11 years ago
- Tracks the ISS and when it is near your area it will send a tweet!☆12Feb 25, 2021Updated 4 years ago
- Lair Framework dockerized.☆38Apr 17, 2021Updated 4 years ago
- splunk alert script to create resilient tickets☆10Jun 8, 2016Updated 9 years ago
- ssh user enumeration☆12Mar 21, 2023Updated 2 years ago
- ☆142May 24, 2024Updated last year
- My python3 implementation of a Forward Shell☆36Jan 25, 2019Updated 7 years ago
- A tool for discovering subdomains via third party services and wordlists.☆75Apr 14, 2016Updated 9 years ago
- Modification and tools for using hostapd for rogue AP attacks impersonating WPA-Enterprise networks to steal user credentials☆40Nov 13, 2018Updated 7 years ago
- Mainframe TN3270 unencrypted TSO session user ID and password sniffer☆50Jun 6, 2023Updated 2 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆10Jun 3, 2017Updated 8 years ago
- A collection of post-exploitation tools for network red teaming.☆139Dec 7, 2018Updated 7 years ago
- Script collection for SSH User Login notifications over Pushover.net☆12Jun 6, 2021Updated 4 years ago
- SDK for reading the NIS code from an Italian Electronic Identity Card (CIE) using C++☆11Mar 8, 2021Updated 4 years ago
- ☆40May 3, 2024Updated last year
- r2-based tool to decrypt iOS applications☆38Sep 9, 2016Updated 9 years ago