An ARP Poisoning Defender script
☆42Jun 25, 2018Updated 7 years ago
Alternatives and similar repositories for ARPPD
Users that are interested in ARPPD are comparing it to the libraries listed below
Sorting:
- DHCP attack tool☆21Oct 4, 2024Updated last year
- Telegram-based PowerShell Runspace Host☆11Dec 8, 2022Updated 3 years ago
- Protect your parents from phishing☆40Dec 4, 2017Updated 8 years ago
- socat version 2☆10Aug 30, 2012Updated 13 years ago
- ☆45Jul 12, 2018Updated 7 years ago
- Small utility script to notify via Slack about Hashcat's progress during a password cracking session☆10Mar 10, 2019Updated 6 years ago
- Suite for Information gathering☆12Jul 2, 2018Updated 7 years ago
- A TCP service multiplexer☆19May 4, 2017Updated 8 years ago
- Comparison table of VMX capabilities for a bunch of processors☆13Nov 3, 2020Updated 5 years ago
- The PowerThIEf, an Internet Explorer Post Exploitation library☆130Feb 27, 2025Updated last year
- Bolster NEO API - Artificial intelligence based zero-hour phishing detection☆13Aug 10, 2021Updated 4 years ago
- Detecting PowerShell Empire, Metasploit Meterpreter and Cobalt Strike agents by payload size sequence analysis and host correlation☆15Aug 17, 2018Updated 7 years ago
- The pentest companion☆15Sep 1, 2021Updated 4 years ago
- BlueKeep powershell scanner (based on c# code)☆39Nov 11, 2019Updated 6 years ago
- Easily Expandable Wireless Intrusion Detection System☆30Oct 12, 2020Updated 5 years ago
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆19Jun 24, 2021Updated 4 years ago
- Wax is a mediocre fuzzer I'm prototyping to test some ideas and get rid of others.☆17Jul 12, 2018Updated 7 years ago
- The Minary main GUI.☆20Jan 29, 2021Updated 5 years ago
- Repository for all cbapi example scripts☆16Sep 18, 2018Updated 7 years ago
- A tool for scanning registery key permissions. Find where non-admins can create symbolic links.☆45Oct 30, 2019Updated 6 years ago
- A few scripts I put together for testing purposes and to automate a few capabilities while doing IR. These scripts are also part of my bl…☆56Jan 24, 2018Updated 8 years ago
- bunch of random stuff☆21Apr 11, 2020Updated 5 years ago
- Advanced Netstat Using Python For Windows☆46Aug 21, 2017Updated 8 years ago
- ☆20Jun 2, 2016Updated 9 years ago
- a program to detect reflective dll injection on a live machine☆76Dec 12, 2015Updated 10 years ago
- Create alerts in The Hive from your Graylog alerts, to be turned into Hive cases.☆45Aug 17, 2020Updated 5 years ago
- Linux Automatic ARP (TCP / UDP / ICMP) Firewall☆83Oct 24, 2019Updated 6 years ago
- Tool for finding Buffer Overflows in simple binaries. CTF use mainly.☆19Mar 6, 2018Updated 7 years ago
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆24Feb 11, 2024Updated 2 years ago
- A wrapper tool for shadowsocks to consistently bypass firewalls.☆81Dec 24, 2017Updated 8 years ago
- The repository accompanying the Buer Emulation workshop☆24Aug 18, 2021Updated 4 years ago
- IPv6 address spoofing with the Neighbor Discovery Protocol☆53Jul 15, 2018Updated 7 years ago
- ☆52Sep 17, 2018Updated 7 years ago
- Strafer: A tool to detect potential infections in Elasticsearch instances☆27Mar 14, 2021Updated 4 years ago
- ☆51Feb 5, 2014Updated 12 years ago
- Mapping of Binaries that allows Arbitrary Code Execution☆26May 10, 2018Updated 7 years ago
- A CALDERA plugin for autonomous incident response☆27Oct 6, 2025Updated 4 months ago
- script to delete local git branches which were removed in remote or merged into current branch☆27May 18, 2020Updated 5 years ago
- Detect silent (unwanted) changes to files on your system☆162May 4, 2020Updated 5 years ago