SwiftOnLinux / SmokingLinuxEveryDayLinks
Smoking Linux Every Day!
β55Updated 5 years ago
Alternatives and similar repositories for SmokingLinuxEveryDay
Users that are interested in SmokingLinuxEveryDay are comparing it to the libraries listed below
Sorting:
- analyze a web-based network traffic πΆ to detect central command and control serversβ79Updated 7 years ago
- β61Updated 7 years ago
- Express security essentials deployment for Linux Serversβ60Updated 5 years ago
- Slides from my ShellCon Talk, OSINT for Pen Tests, given 10/19.β60Updated 7 years ago
- Modular tool to test exfiltration techniques.β37Updated 8 years ago
- Digital Forensics and Incident Response Wikiβ40Updated 11 years ago
- A tool to generate graph and other output from NMAP XML filesβ116Updated 6 years ago
- Automated enumerationβ30Updated 4 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.β66Updated 6 years ago
- A ton of helpful toolsβ39Updated 4 years ago
- Checkpoint Firewall Ruleset Auditor ( For the HTML exports when you do not have the object files )β39Updated 8 years ago
- Metasploit Usage Wikiβ47Updated 10 years ago
- A collection of scripts to initialize a windows VM to run all the malwares!β106Updated 5 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.β72Updated 5 years ago
- Easy 802.1Q VLAN Hoppingβ80Updated last year
- This tool extract domains from IP address based in the information saved in virustotal.β24Updated 8 years ago
- β43Updated 9 years ago
- A collection of scripts that I've written while pentesting.β31Updated 7 years ago
- Automatically performs the SMB relay attackβ73Updated 9 years ago
- Some simple and useful toolsβ15Updated 7 years ago
- Collection of scripts created while taking the SecurityTube Python Scripting Expert courseβ56Updated 5 years ago
- Stop searching for sample hashes on 10 different sites.β66Updated 7 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes resβ¦β45Updated 6 years ago
- yotter - bash script that performs recon and then uses dirb to discover directories that might lead to information leakageβ125Updated 7 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwordsβ46Updated 8 years ago
- Simple Bash script to retrieve basic system information.β30Updated 7 years ago
- BTG's purpose is to make fast and efficient search on IOCβ70Updated 6 years ago
- A few transforms and a machine for parsing Nmap XML resultsβ39Updated 9 years ago
- Find a useable IP address to useβ30Updated 11 years ago
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurablβ¦β106Updated 11 years ago