LeonBroseliske / CFCLinks
Centralized Firewall Control
☆21Updated 7 years ago
Alternatives and similar repositories for CFC
Users that are interested in CFC are comparing it to the libraries listed below
Sorting:
- This tool extract domains from IP address based in the information saved in virustotal.☆24Updated 8 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆23Updated 7 years ago
- Dumain Bruteforcer - a fast and flexible domain bruteforcer☆53Updated 6 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆66Updated 6 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- ☆20Updated 9 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆87Updated 7 years ago
- Metasploit Framework☆25Updated 7 years ago
- Intelligent threat hunter and phishing servers☆48Updated 6 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- (Unofficial) Python API for cybercrime-tracker.net☆38Updated 7 years ago
- Check if a IP is from tor or is a malicious proxy☆56Updated 4 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 8 years ago
- BlackHat Europe 2017 Slides☆26Updated 7 years ago
- CTF Writeups☆18Updated 7 years ago
- ~ BannerGrab☆26Updated 8 years ago
- Windows Offline Common Password Hash Checker☆29Updated 8 years ago
- ANWI - All New Wireless IDS☆27Updated 6 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Updated 7 years ago
- SQL SERVER Exploitation.☆27Updated 8 years ago
- Passive Network Audit Framework☆32Updated 7 years ago
- Some simple and useful tools☆15Updated 7 years ago
- Simple php backdoor based on extension☆22Updated 10 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆36Updated 4 years ago
- Cross Distribution Exploit Testing☆28Updated 9 years ago
- Simple IP Information Tools for Reputation Data Analysis☆23Updated 6 years ago
- hemingway is a simple and easy to use spear phishing helper.☆42Updated 8 years ago
- Source Code Intelligence☆30Updated 7 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆55Updated 8 years ago
- ☆25Updated 8 years ago