Telefonica / OMLASPLinks
OMLASP (Ideas Locas)
☆22Updated 2 years ago
Alternatives and similar repositories for OMLASP
Users that are interested in OMLASP are comparing it to the libraries listed below
Sorting:
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆19Updated last year
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- Melee: Tool to Detect Infections in MySQL Instances☆22Updated last year
- A simple program to query nmap xml files in the terminal.☆27Updated 5 years ago
- SecurityBsides Roma Conference Repo☆10Updated 2 years ago
- ☆24Updated 6 years ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆52Updated last year
- OWASP Foundation Web Respository☆36Updated 3 years ago
- Red Team Server (RTS)☆16Updated last year
- Modular framework to exploit UPS devices☆63Updated 2 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- Active DIrectory Lab for Pentesting Practice☆24Updated 2 years ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated last year
- Docker-based platform for conducting MiTM attacks using Responder, NTLMRelayX, and Empire☆18Updated 2 months ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆15Updated 8 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated 11 months ago
- Extract credentials from lsass remotely☆16Updated 5 years ago
- Script to automate, when possible, the passive reconnaissance performed on a website prior to an assessment.☆37Updated 2 weeks ago
- automated tool designed to streamline the search and identification of Proofs of Concept (POCs)☆16Updated last year
- ☆17Updated 3 years ago
- A collection of Script for Red Team & Incidence Response☆11Updated 2 years ago
- A National Vulnerability Database (NVD) API query tool☆18Updated 2 years ago
- An optimized Python3 library to fetch the most recent exploit-database, create searchable indexes for CVE->EDBID and EDBID -> CVE, and pr…☆29Updated 7 months ago
- ☆28Updated last year
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆27Updated 2 years ago
- Lab Environment for learning client-side attacks such as CSRF, Clickjacking, XSS, and CORS abuse.☆20Updated 2 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 3 years ago
- ☆21Updated 2 years ago