A Red Team Script to Detect Canary Tokens and Seed Files
☆15Jan 2, 2024Updated 2 years ago
Alternatives and similar repositories for DetectingCanaryTokens
Users that are interested in DetectingCanaryTokens are comparing it to the libraries listed below
Sorting:
- URL / IP / Email defanging with Golang. Make IoC harmless.☆20Sep 9, 2025Updated 5 months ago
- Ansible modules to interact with the apache guacamole API☆27Aug 20, 2024Updated last year
- ☆34May 24, 2023Updated 2 years ago
- ☆10Jun 16, 2021Updated 4 years ago
- ☆12Feb 6, 2026Updated 3 weeks ago
- Web Recon Tool 🔍 An efficient reconnaissance tool for security researchers, ethical hackers, and developers to gather vital information …☆25Feb 23, 2026Updated last week
- Automation of some MAPT activities and interaction with the mobile Android device.☆22Sep 28, 2025Updated 5 months ago
- STIG FireFox the Easy Way☆15Jul 26, 2024Updated last year
- Esta es una extensión del proyecto original de Avilla Forensics☆12Nov 18, 2025Updated 3 months ago
- Shell Utils is an educational framework designed to make shell programming accessible and powerful. It is the result of extensive work ov…☆13Updated this week
- Penstaller: A Python tool to automate the installation of essential bug bounty and pentesting tools. With one command, it sets up tools f…☆17Mar 14, 2025Updated 11 months ago
- multi-threaded script uses VirusTotal and AbuseIPDB APIs and generate an excel with all needed data☆10Mar 14, 2023Updated 2 years ago
- This is automation tool which utilize 2 sub -domain finder and then sort out working sub-domain and finally scan for sub-doamin TAKEOVER.☆11May 6, 2023Updated 2 years ago
- CriminalIP is a threat intelligence service that provides detailed information about IP addresses, domains, and other network elements.☆13Aug 20, 2024Updated last year
- Module to support the import and export of Group Policy WMI filters.☆11Jun 23, 2023Updated 2 years ago
- improve mulval to accommodate some updates and make it more suitable for industrial control network☆12Nov 22, 2022Updated 3 years ago
- A tool to check TCP connections.☆15Jun 20, 2025Updated 8 months ago
- hubspot mcp server☆12Apr 1, 2025Updated 11 months ago
- Multi-threading Leaks/Intelligence file parser☆15Feb 16, 2026Updated 2 weeks ago
- A repository dedicated to deliver a comprehensive set of tools for integration and convenient use of Kaspersky Threat Intelligence servic…☆21Updated this week
- The original code for SCARA: Scalable Graph Neural Networks with Feature-Oriented Optimization (VLDB 2022) and Scalable Decoupling Graph …☆13Mar 8, 2024Updated last year
- Daily updated malware indicator lists from TR-CERT (USOM), including parsed malicious URLs, IPs, and domains.☆15Updated this week
- Automation with SSH for Hacking☆10Jan 28, 2025Updated last year
- This is the code repository for the paper "Zero-Sum Stochastic Stackelberg Games".☆16Oct 12, 2022Updated 3 years ago
- ☆23Jun 28, 2025Updated 8 months ago
- Pentesting tool to automate common op tasks and organize discovered data.☆13Dec 23, 2025Updated 2 months ago
- ☆13May 30, 2025Updated 9 months ago
- Correlate NVD datasets wIth CWE/CAPEC/CVSS labels for customised usage. Plus static analysis and data visualisation.☆13Nov 17, 2023Updated 2 years ago
- Script en bash de Nmap que se puede personalizar para ajustar el escaneo a tus necesidades.☆12Jul 20, 2024Updated last year
- RASSH – Reinforced Adaptive SSH Honeypot This is a project developed for my Phd Thesis and the target is to create an Adaptive Honeypot…☆12Jul 29, 2019Updated 6 years ago
- ☆12Feb 20, 2025Updated last year
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environments☆12Nov 23, 2023Updated 2 years ago
- NetFuzzer is a comprehensive network security assessment tool for internal and external network components, including Host Machines, Fire…☆15Aug 4, 2025Updated 7 months ago
- ☆15Apr 10, 2025Updated 10 months ago
- A curated collection of amazing software, libraries, documents, books, resources, and other cool security-related content.☆13Nov 13, 2024Updated last year
- RedAudit is a next-generation Windows forensic and security assessment framework featuring a live cyber-operations GUI built for real inv…☆35Nov 15, 2025Updated 3 months ago
- ☆14Nov 8, 2024Updated last year
- Evolutionary Based Moving Target Cyber-Defense Master Thesis☆12Jan 21, 2020Updated 6 years ago
- Comprehensive adversary emulation tool for security testing on Google Cloud Platform (GCP) environments.☆14Jun 14, 2024Updated last year