☆13Jun 5, 2014Updated 11 years ago
Alternatives and similar repositories for peepingtom
Users that are interested in peepingtom are comparing it to the libraries listed below
Sorting:
- Nmap Web Dashboard and Reporting☆34May 1, 2022Updated 3 years ago
- CyberArk Privileged Access Security automatic deployment using Ansible☆39Aug 1, 2023Updated 2 years ago
- Quick Command Cheatsheet, you can import/open directly to you ONE NOTE.☆10Updated this week
- Ejercicios de SQL☆16Nov 29, 2025Updated 3 months ago
- Automatically create safes and permission with role groups based on your enterprise standards and policies☆12Jul 31, 2018Updated 7 years ago
- ☆11Dec 22, 2022Updated 3 years ago
- Scan IPv4 prefixes for DNS revolvers and classify them as open/closed☆10Jun 19, 2014Updated 11 years ago
- A few starter examples of ansible playbooks, to show features and how they work together. See http://galaxy.ansible.com for example role…☆10Aug 3, 2016Updated 9 years ago
- Home of https://redteam.guide☆15Sep 19, 2022Updated 3 years ago
- CyberArk Identity API PowerShell Module☆11Apr 15, 2025Updated 10 months ago
- ☆12Oct 9, 2022Updated 3 years ago
- ☆10Apr 11, 2018Updated 7 years ago
- Writeup of what I'm learning with PentesterLab's Bootcamp☆10May 13, 2017Updated 8 years ago
- A simple, small in size and portable keylogger for Windows XP/Vista/7/8/10/11 that doesn't require .NET Framework.☆14Feb 16, 2022Updated 4 years ago
- ☆12Oct 12, 2013Updated 12 years ago
- The OpenFISMA project is an open source application designed to reduce the complexity and automate the regulatory requirements of the Fed…☆10Apr 21, 2015Updated 10 years ago
- A very simple Flask application that demonstrates how to integrate OpenID connect into user session management.☆12Jul 5, 2018Updated 7 years ago
- Webmin 1.910 - Remote Code Execution Using Python Script☆10Feb 6, 2024Updated 2 years ago
- Hunting Newly Registered Domains☆10Jan 6, 2019Updated 7 years ago
- Linux password crack☆14Apr 11, 2022Updated 3 years ago
- Collection of red team scripts, resources & configs.☆15Feb 14, 2026Updated 3 weeks ago
- Docker container escape enumeration tool.☆12Jan 23, 2021Updated 5 years ago
- Rust Weaponization for Red Team Engagements.☆12Nov 14, 2022Updated 3 years ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆11Apr 16, 2022Updated 3 years ago
- Open source Windows Event Collector☆10Jun 15, 2024Updated last year
- Ansible role to deploy Cyberark Central Policy Manager☆15Dec 5, 2024Updated last year
- CONTROL C2 is a command and control framework designed for red teamers and penetration testers.☆15Oct 16, 2024Updated last year
- ☆12Oct 18, 2019Updated 6 years ago
- Binwalk in a Docker image☆10Jul 31, 2019Updated 6 years ago
- Evaluation of packer type estimation/detection tools☆14Mar 24, 2021Updated 4 years ago
- A script to download OUI data from the IEEE and parse it into the nmap-mac-prefixes file so Nmap has the latest OUI data.☆12Jun 8, 2022Updated 3 years ago
- Simple Syslog Generator☆12Jun 15, 2024Updated last year
- Ludus roles to deploy ASR rules and MDI auditing settings☆24Aug 5, 2025Updated 7 months ago
- Deployment of FHIR servers in Azure☆11Sep 12, 2018Updated 7 years ago
- Integrate IBM QRadar and RPA to automate security L1 tasks.☆14May 20, 2022Updated 3 years ago
- An assessment tool to interact with Velocio PLCs☆13Sep 24, 2021Updated 4 years ago
- Defending OT with ATT&CK provides a customized threat collection tailored to the attack surface and threat model of operational technolog…☆13May 28, 2025Updated 9 months ago
- Generate your own (fake) Sun Tzu quote images!☆15May 4, 2021Updated 4 years ago
- eSentire additions to the nmap network scanner☆14Mar 29, 2016Updated 9 years ago