LeonBroseliske / CFCLinks
Centralized Firewall Control
☆21Updated 7 years ago
Alternatives and similar repositories for CFC
Users that are interested in CFC are comparing it to the libraries listed below
Sorting:
- My collection of dockerfiles☆24Updated 9 years ago
- Metasploit Framework☆25Updated 7 years ago
- Dumain Bruteforcer - a fast and flexible domain bruteforcer☆53Updated 6 years ago
- ANWI - All New Wireless IDS☆27Updated 6 years ago
- BlackHat Europe 2017 Slides☆26Updated 7 years ago
- Intelligent threat hunter and phishing servers☆47Updated 6 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆87Updated 7 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆66Updated 6 years ago
- Express security essentials deployment for Linux Servers☆59Updated 4 years ago
- GUI Tool to generate threat intelligence information in various formats☆43Updated 7 years ago
- hemingway is a simple and easy to use spear phishing helper.☆41Updated 8 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆24Updated 8 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆23Updated 7 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- Automated script for NMAP Scanner with some custom .nse scripts :) for lazy geeks :V☆17Updated 5 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- Download and Inject code into Google Chrome extensions☆13Updated 7 years ago
- A tool to help you manage your leaks☆34Updated 7 years ago
- ☆18Updated last year
- (Unofficial) Python API for cybercrime-tracker.net☆37Updated 7 years ago
- Check if a IP is from tor or is a malicious proxy☆56Updated 4 years ago
- ☆22Updated 8 years ago
- Passive Network Audit Framework☆32Updated 7 years ago
- Slides from my ShellCon Talk, OSINT for Pen Tests, given 10/19.☆61Updated 7 years ago
- Tools for check NSA EGBL exploit against Fortinet Firewall☆32Updated 8 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆36Updated 4 years ago
- Herramienta escrita en Python y utilizando la librería Scapy basada en Yersinia para la implementación de ataques de capa de enlace de da…☆60Updated 5 years ago
- PowerShell script to retreive wifi ESSIDs and Passwords.☆26Updated 7 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Updated 8 years ago