Phactive - Monitoring an Environment with Nmap red teaming
☆12May 11, 2019Updated 6 years ago
Alternatives and similar repositories for phactive
Users that are interested in phactive are comparing it to the libraries listed below
Sorting:
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- ☆22May 20, 2016Updated 9 years ago
- Various fuzzers written in Python. Currently has a TCP server for fuzzing client software, and a CLI fuzzer to use against programs ran f…☆11Feb 14, 2018Updated 8 years ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- Shell intended for forwarding-only ssh connection via jumphost☆11Jun 27, 2018Updated 7 years ago
- An automated firmware analysis tool based on Firmadyne (https://github.com/firmadyne/firmadyne)☆24Jul 8, 2017Updated 8 years ago
- Collection of dockerfiles to build containers☆13Mar 19, 2018Updated 7 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 7 years ago
- Pull author and committer names and emails from Travis-CI☆11Aug 9, 2020Updated 5 years ago
- Merge results from NMAP and Masscan into one CSV file☆18Jun 19, 2018Updated 7 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Aug 2, 2019Updated 6 years ago
- Nohidy the system admins best friend, multi platform auditing tool☆14Feb 6, 2018Updated 8 years ago
- Internet Radio based on the Beaglebone Black platform☆15Mar 4, 2016Updated 9 years ago
- Arp spoof detection tool☆26Jun 30, 2017Updated 8 years ago
- CHEF cookbook for automating provisioning of CTF competition and wargame challenge platforms☆12Jan 5, 2016Updated 10 years ago
- Simulates a logged in user.☆16Jul 10, 2024Updated last year
- Advanced Vulnerable Web Application (AVWA)☆14Jun 10, 2017Updated 8 years ago
- A cookbook for managing the local security policy on a Windows system☆13Apr 13, 2021Updated 4 years ago
- Proof of concept for vulnerability management of Docker containers☆16May 4, 2017Updated 8 years ago
- Writeups for various crackmes, CTFs, wargames, etc.☆15Apr 21, 2017Updated 8 years ago
- 🛡 Monitor, analyze, & report security misconfigurations across environments.☆18Oct 26, 2017Updated 8 years ago
- Learn basic crypto in 2 hours☆16Nov 25, 2021Updated 4 years ago
- The challenge writeups and solutions for yookiterm-challenge-files☆37Jan 30, 2023Updated 3 years ago
- XSS payload designed to steal LastPass users' credentials☆16Apr 25, 2014Updated 11 years ago
- Vulnerable rails application that is configurable in its vulnerability☆20Jun 4, 2018Updated 7 years ago
- Mass Triage Tools☆20Dec 16, 2025Updated 2 months ago
- Python script to extract and bruteforce OpenNMS password hashes in users.xml☆18Jun 21, 2017Updated 8 years ago
- ☆35Feb 20, 2018Updated 8 years ago
- Metasploit Exploit Module for the Android addJavascriptInterface Issue (MITM)☆36Jan 15, 2015Updated 11 years ago
- Slides from previous conference talks☆41May 13, 2017Updated 8 years ago
- FLUXION☆22Oct 3, 2016Updated 9 years ago
- Local privilege escalation scripts and tools☆17Aug 4, 2016Updated 9 years ago
- only for 31337☆24Nov 19, 2016Updated 9 years ago
- REST API test utility☆22Oct 31, 2019Updated 6 years ago
- Packaging audit toolkit using vulners.com vulnerability database☆20Apr 9, 2018Updated 7 years ago
- All related files and slides for past talks☆44Dec 14, 2025Updated 2 months ago
- AutoBrowser Screenshot☆49Oct 27, 2016Updated 9 years ago
- ☆21Oct 22, 2019Updated 6 years ago