LeonBroseliske / CFCView external linksLinks
Centralized Firewall Control
☆21Feb 5, 2018Updated 8 years ago
Alternatives and similar repositories for CFC
Users that are interested in CFC are comparing it to the libraries listed below
Sorting:
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 7 years ago
- Dumain Bruteforcer - a fast and flexible domain bruteforcer☆52Sep 19, 2018Updated 7 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Jul 27, 2018Updated 7 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Aug 7, 2020Updated 5 years ago
- Express security essentials deployment for Linux Servers☆60Oct 19, 2020Updated 5 years ago
- Listing subdomains about a main domain☆58May 9, 2018Updated 7 years ago
- Just a silly recon tool that uses data from SSL Certificates to find potential host names☆29May 22, 2023Updated 2 years ago
- ☆14Aug 27, 2025Updated 5 months ago
- This tool is based on regex with effective standards for detecting phishing sites in real time using certstream and can also detect puny…☆81Nov 30, 2018Updated 7 years ago
- Another vulnerability scanner☆18Aug 9, 2025Updated 6 months ago
- ☆63Mar 21, 2018Updated 7 years ago
- Tool for checking Whether a domain or its multiple sub-domains are up and running.☆71Jan 21, 2019Updated 7 years ago
- Python tool and library to help analyze files during malware triage and analysis.☆78Jul 2, 2020Updated 5 years ago
- Malware detection using learning and information retrieval for Android☆74Aug 11, 2020Updated 5 years ago
- Automate SSH communication with firewalls, switches, etc.☆27Mar 29, 2018Updated 7 years ago
- Linux Automatic ARP (TCP / UDP / ICMP) Firewall☆83Oct 24, 2019Updated 6 years ago
- Get clients and access points.☆48Aug 28, 2019Updated 6 years ago
- Terminal Ip Lookup Tool☆56May 16, 2014Updated 11 years ago
- Swiss Army knife for raw bytes manipulation & interception☆56Apr 8, 2023Updated 2 years ago
- ☆25May 9, 2021Updated 4 years ago
- Malware/IOC ingestion and processing engine☆109Nov 20, 2018Updated 7 years ago
- Multi source CVE/exploit parser.☆27Aug 30, 2017Updated 8 years ago
- Check if a IP is from tor or is a malicious proxy☆57Feb 9, 2021Updated 5 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37May 15, 2018Updated 7 years ago
- Ivan Ricart Borges - Program to detect the existence of remote/local stack-based buffer-overflow vulnerabilities using the standard commu…☆54May 15, 2021Updated 4 years ago
- Tool for check the cookie flag in multiple sites☆28Dec 30, 2015Updated 10 years ago
- Security Tool to detect arp poisoning attacks☆54Apr 15, 2018Updated 7 years ago
- Obfuscate your Bash Code 🛡️☆105Oct 11, 2024Updated last year
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆71Apr 10, 2019Updated 6 years ago
- Ip Vulnerability check to Eternal Blue , Romance , Synergy , Champion , Erraticgopher & Eagerlever☆124Nov 18, 2023Updated 2 years ago
- 2018 Computational Text Analysis Notebooks, University of Mannheim☆13Nov 22, 2018Updated 7 years ago
- Crypto tool for pentest and ctf : try to uncipher data using multiple algorithms and block chaining modes. Usefull for a quick check on u…☆124Jan 4, 2018Updated 8 years ago
- Nix Audit made easier (RHEL, CentOS)☆65Apr 22, 2025Updated 9 months ago
- ☆128May 22, 2023Updated 2 years ago
- An information gathering tool to collect git commit emails in version control host services☆152May 5, 2019Updated 6 years ago
- Neto | A tool to analyse browser extensions☆88Sep 20, 2020Updated 5 years ago
- The Python Password-Protected Obfuscator☆33Jul 7, 2019Updated 6 years ago
- Red Login: SSH Brute-force Tools☆106Jun 28, 2018Updated 7 years ago
- Excalibur is an Eternalblue exploit payload based "Powershell" for the Bashbunny project.☆134May 27, 2019Updated 6 years ago