OfriOuzan / HardeningMeter
HardeningMeter is an open-source Python tool carefully designed to comprehensively assess the security hardening of binaries and systems.
☆59Updated 3 months ago
Alternatives and similar repositories for HardeningMeter:
Users that are interested in HardeningMeter are comparing it to the libraries listed below
- Some of my rough notes for Docker threat detection☆47Updated last year
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆65Updated 2 years ago
- C2 Automation using Linode☆80Updated 2 years ago
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆63Updated 5 months ago
- The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP syst…☆47Updated last week
- ☆37Updated 11 months ago
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆48Updated this week
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆63Updated last year
- ☆40Updated 6 months ago
- ☆77Updated 11 months ago
- ☆115Updated last year
- ☆59Updated 2 months ago
- linikatz is a tool to attack AD on UNIX☆144Updated last year
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆39Updated 2 years ago
- https://lolad-project.github.io/☆72Updated 2 months ago
- ☆93Updated 2 years ago
- All kinds of tiny shells☆58Updated 2 years ago
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆90Updated 8 months ago
- ☆51Updated last year
- Small toolkit for extracting information and dumping sensitive strings from Windows processes☆108Updated 7 months ago
- 🌩️ Collection of BloodHound queries for Azure☆60Updated 2 months ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆60Updated 11 months ago
- SAP Penetration Testing: A Comprehensive Analysis of SAP Security Issues☆38Updated last year
- POC for DLL Proxying / Hijacking☆60Updated last week
- ☆34Updated last year