TKCERT / winnti-nmap-scriptLinks
Nmap Script to scan for Winnti infections
☆71Updated 7 years ago
Alternatives and similar repositories for winnti-nmap-script
Users that are interested in winnti-nmap-script are comparing it to the libraries listed below
Sorting:
- ☆61Updated 7 years ago
- No-Script Automation Tool☆56Updated 7 years ago
- Nix Audit made easier (RHEL, CentOS)☆65Updated 6 months ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆55Updated last year
- A testing framework for mail security and filtering solutions.☆245Updated 2 years ago
- This PowerShell script will determine if your connection to external servers over HTTPS is being decrypted by an intercepting proxy such …☆67Updated 7 years ago
- Schillings SwordPhish empowers organisations and engages its employees to establish the key component of any cyber security strategy: th…☆107Updated 7 years ago
- Test a network's egress controls with various levels of success and failure.☆104Updated 3 years ago
- A bunch of scripts I use to work with urlscan.io☆35Updated 6 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆72Updated 6 years ago
- Sandbox feature upgrade with the help of wrapped samples☆76Updated 7 years ago
- rules to identify files containing juicy information like usernames, passwords etc☆127Updated 7 years ago
- An extensible honeypot framework☆96Updated 3 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 7 years ago
- Generate ATT&CK Navigator layer file from PowerShell Empire agent logs☆48Updated 7 years ago
- Slides from various talks that I've given over the years☆118Updated 2 years ago
- Identify compromised domains or emails. A python based HIBP and HackedEmails wrapper☆38Updated 7 years ago
- BTG's purpose is to make fast and efficient search on IOC☆71Updated 6 years ago
- Security Onion Elastic Stack☆46Updated 4 years ago
- Prepare, Hunt, and Respond - Conceptual model against cyber attacks by JYVSECTEC☆61Updated 3 years ago
- Stop searching for sample hashes on 10 different sites.☆66Updated 7 years ago
- Credential Phish Analysis and Automation☆97Updated 7 years ago
- A powershell script for creating a Windows honeyport.☆90Updated 7 months ago
- Utility to generate similar IDN domain names☆48Updated 7 years ago
- Mitre Att&ck Technique Emulation☆82Updated 6 years ago
- Creates dictionaries based on Wikipedia titles☆62Updated 6 years ago
- Lootbox downloads open directories shared on Twitter.☆34Updated 4 years ago
- GreyNoise Query Language☆82Updated 6 years ago
- Resources and materials for DEF CON 2018 Packet Hunting Workshop☆79Updated 7 years ago
- Powershell Empire Persistence finder☆120Updated 8 years ago