SubtleScope / logfile-generatorsLinks
Series of scripts to generate fake logs for use in cyber exercises.
☆17Updated 9 years ago
Alternatives and similar repositories for logfile-generators
Users that are interested in logfile-generators are comparing it to the libraries listed below
Sorting:
- Exfiltrate files via DNS☆96Updated 11 years ago
- Modular tool to test exfiltration techniques.☆37Updated 8 years ago
- AYY LMAO☆22Updated 9 years ago
- Capture passwords of login attempts on non-existent and disabled accounts.☆35Updated 2 years ago
- A Network Inspection Tool☆81Updated 7 years ago
- Websocket based egress tester☆20Updated 8 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago
- ☆50Updated 9 years ago
- Clustering NMAP XML results to help make sense of large scan results.☆33Updated 2 years ago
- ☆48Updated 9 years ago
- Scripts that are suited for blue teams☆33Updated 9 years ago
- Anti-Honeypot Demo (obsolete)☆18Updated 7 years ago
- Cli interface to threatcrowd.org☆19Updated 8 years ago
- Metadata Inspection Database Alerting System☆42Updated 11 years ago
- Automatically scans for malicious proxies.☆30Updated 10 years ago
- splunk alert script to create resilient tickets☆10Updated 9 years ago
- Nmap enumeration and script scan automation script☆38Updated 2 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- ☆49Updated 9 years ago
- DNS Enumeration and Reconnaissance Tool☆36Updated 9 years ago
- Traceroute improved wrapper for CSIRT and CERT operators☆38Updated 9 months ago
- DEPRECATED! LOOK AT CREDNINJA! A tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a …☆15Updated 9 years ago
- Unpack MIME attachments from a file and check them against virustotal.com☆44Updated 9 years ago
- Grab a Twitter user timeline for further processing (storing to Elasticsearch, highligthing, etc)☆41Updated 9 years ago
- Ansible playbook to install Malware Information Sharing Platform (MISP)☆17Updated 10 years ago
- A collection of useful scripts for penetration testers☆83Updated 12 years ago
- ☆17Updated 10 years ago
- VPS infrastructure found in HT dumps☆26Updated 10 years ago
- It's like a polaroid, but for domains☆24Updated 10 years ago
- CHEF cookbook for automating provisioning of CTF competition and wargame challenge platforms☆12Updated 9 years ago