LLMNR/NBNS/mDNS Spoofing Detection Toolkit
☆60Apr 3, 2022Updated 3 years ago
Alternatives and similar repositories for VindicateTool
Users that are interested in VindicateTool are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Machine Learning basics with phishing dataset☆10Apr 19, 2021Updated 4 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Jan 14, 2021Updated 5 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆23Oct 8, 2014Updated 11 years ago
- Respounder detects presence of responder in the network.☆322Jun 15, 2019Updated 6 years ago
- Decrypts Cisco VPN Group Passwords☆18Jan 20, 2012Updated 14 years ago
- A Flask Based Web Application which is used to detect the phishing URL's.☆11Nov 27, 2019Updated 6 years ago
- ☆11Sep 30, 2023Updated 2 years ago
- WPUpdate is a simple Linux service that automatically checks for a new version of Wordpress each night at 2AM.☆36Feb 7, 2014Updated 12 years ago
- Examples of simple code patterns causing BOF☆14Apr 10, 2020Updated 5 years ago
- ☆27May 14, 2022Updated 3 years ago
- PoC for CVE-2022-23940☆12May 7, 2025Updated 10 months ago
- Port forwarding via MSRPC (445/tcp) [WIP]☆34Aug 26, 2021Updated 4 years ago
- The Artillery Project is an open-source blue team tool designed to protect Linux and Windows operating systems through multiple methods.☆337Sep 30, 2020Updated 5 years ago
- vRealize RCE + Privesc (CVE-2021-21975, CVE-2021-21983, CVE-0DAY-?????)☆39Apr 7, 2021Updated 4 years ago
- Knowing which rule should trigger according to the redcannary test☆11Nov 23, 2024Updated last year
- IcedID Decryption Tool☆28May 7, 2021Updated 4 years ago
- ☆12Jun 29, 2021Updated 4 years ago
- Try harder to bypass that WAF...☆14Jan 4, 2015Updated 11 years ago
- Crowdstrike Falcon Host script for iterating through instances to get alert and other relevant data☆13Jul 16, 2019Updated 6 years ago
- ☆81Nov 2, 2019Updated 6 years ago
- 一个简单的php危险函数检测工具☆10Dec 19, 2018Updated 7 years ago
- CVE-2020-15227 exploit☆20Oct 9, 2020Updated 5 years ago
- ☆46Jul 13, 2021Updated 4 years ago
- Accepts a domain name and queries multiple sources to return subdomains. Includes option to scan the returned subdomains to check connect…☆14Aug 9, 2019Updated 6 years ago
- A curated threat modeling library collection☆24Dec 1, 2023Updated 2 years ago
- Documentation and supporting script sample for Windows Exploit Guard☆169Sep 8, 2025Updated 6 months ago
- Useful Windows and AD tools☆15Feb 20, 2022Updated 4 years ago
- ☆27Dec 6, 2013Updated 12 years ago
- 分享在建设安全管理体系、ISO27001、等级保护、安全评审过程中的点点滴滴☆23Aug 27, 2018Updated 7 years ago
- 识别操作系统指纹☆20Jan 17, 2022Updated 4 years ago
- a open source rat from china☆26Oct 28, 2016Updated 9 years ago
- A collection of awesome penetration testing resources, tools and other shiny things☆12Oct 10, 2017Updated 8 years ago
- Simple Process Hollowing in C#☆68Oct 23, 2017Updated 8 years ago
- Disguise your MAC Address as that of any manufacturer as you want.☆10Jan 6, 2021Updated 5 years ago
- Windows提权辅助工具☆24Aug 2, 2020Updated 5 years ago
- ☆31Feb 24, 2014Updated 12 years ago
- This script runs multithreading module that connects to a remote TCP server, monitors active (opened) Microsoft Word documents (.doc,.doc…☆33Jul 24, 2020Updated 5 years ago
- A Canary which fires when uninstalled☆34Mar 16, 2021Updated 5 years ago
- Workshop Materials from DEFCON 25 (7/27/2017)☆22Jul 31, 2017Updated 8 years ago