Logisek / DeltaScanLinks
Network scanning tool designed to detect and report changes in open ports and services over time
☆10Updated 2 months ago
Alternatives and similar repositories for DeltaScan
Users that are interested in DeltaScan are comparing it to the libraries listed below
Sorting:
- ☆17Updated 10 months ago
- wordlists for password cracking☆28Updated 3 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆15Updated 8 years ago
- ☆26Updated 3 years ago
- Collection of red machine learning projects☆41Updated 4 years ago
- Malware campaigns and APTs research by BlackArrow☆19Updated 5 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆25Updated 3 years ago
- Static Decryptor for IcedID Malware☆18Updated 3 years ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆58Updated 2 months ago
- Shock the shell! Exploit many injection method for shellshock☆18Updated 7 years ago
- Ansible scripts to build an attack box☆25Updated 7 years ago
- isodump - ISO dump utility☆41Updated 6 years ago
- Files to automatically deploy red team Active Directory test lab☆47Updated 3 years ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆28Updated 2 years ago
- Tools for playing w/ CobaltStrike config - extractin, detection, processing, etc...☆28Updated 2 years ago
- Finding sensitive information in the trimmed parts of cropped images☆29Updated 3 years ago
- ☆16Updated last week
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆62Updated 7 years ago
- Webhood is a privately hosted URL scanner used by threat hunters and security analysts for analyzing phishing and malicious sites.☆31Updated last year
- Command-line tool to search for malware samples in various repositories☆11Updated 3 years ago
- Exploits made practicing for OSCE☆23Updated 5 years ago
- POC for a basic C2 server using the python aiohttp framework☆15Updated 5 years ago
- ☆64Updated last year
- Generate representative samples from Pwned Passwords (HIBP)☆12Updated 3 years ago
- Yara rules☆21Updated 2 years ago
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Updated 4 years ago
- s3eker is an extensible way to find open S3 buckets.☆17Updated 5 years ago
- ☆18Updated 5 years ago
- Repository for LNK stuff☆31Updated 3 years ago
- Continuous kerberoast monitor☆45Updated 2 years ago