SteveMcGrath / DoFlerLinks
Dashboard of Fail. A application to carve out images/accounts/vulns on conference networks and display them for general entertainment.
☆124Updated 6 years ago
Alternatives and similar repositories for DoFler
Users that are interested in DoFler are comparing it to the libraries listed below
Sorting:
- Duct Tape Command and Control!☆96Updated 2 weeks ago
- Web Sight Docker Deployment☆122Updated 7 years ago
- Repo for autosnort scripts.☆158Updated 4 years ago
- Transparent network tap☆118Updated 9 years ago
- GoatRider is a simple tool that will dynamically pull down Artillery Threat Intelligence Feeds, TOR, AlienVaults OTX, and the Alexa top 1…☆141Updated 6 years ago
- Computer Network Defender's Toolkit, specializing in active defense techniques.☆7Updated 6 years ago
- The Artillery Project is an open-source blue team tool designed to protect Linux and Windows operating systems through multiple methods.☆330Updated 4 years ago
- A tool to generate graph and other output from NMAP XML files☆116Updated 6 years ago
- ☆73Updated 7 years ago
- The Shared Host Integrated Password System (SHIPS) is a solution to provide unique and rotated local super user or administrator password…☆128Updated 7 years ago
- Vulnerability Compliance Report Tool used to parse Nessus files into html reports created by SynerComm, Inc.☆166Updated 6 years ago
- Get your APT on using social media as a tool for data exfiltration.☆147Updated 2 years ago
- Common Findings Database☆101Updated 6 years ago
- A powershell script for creating a Windows honeyport.☆89Updated 4 months ago
- Various public documents, white-papers, articles, data, analysis, and statistics about breaches and security trends.☆93Updated 6 years ago
- Basic Anomaly IDS capabilities with Python and Bro☆105Updated 7 years ago
- ☆141Updated last year
- Lair is a reactive attack collaboration framework and web application built with meteor.☆383Updated 5 years ago
- Various Cheat Sheets related to development and security☆143Updated 5 years ago
- A tool for importing vulnerability scanner data and then allowing you to manipulate the risks, affected hosts, and create risk ordered ou…☆80Updated last year
- Harbinger Threat Intelligence☆82Updated 9 years ago
- ☆105Updated 5 years ago
- ☆208Updated 7 years ago
- The Seeker of IOC☆129Updated 4 years ago
- The Intelligent Honey Net Project attempts to create actionable information from honeypots☆62Updated 9 years ago
- ☆32Updated 10 years ago
- Not another SCA. Lists of interesting regular expressions for searching code for security issues. Think FuzzDB for SCA.☆15Updated 8 years ago
- Materials from my Circle City Con talk: Fantastic OSINT (and where to find it)☆23Updated 9 years ago
- Modern Honey Network App for Splunk☆51Updated 5 years ago
- Stargate☆95Updated 8 years ago