Th3J0kr / jtb_investigator
A tool to speed up the process of doing the same simple IP/Domain Name lookups over and over again.
☆66Updated 6 years ago
Alternatives and similar repositories for jtb_investigator:
Users that are interested in jtb_investigator are comparing it to the libraries listed below
- ☆61Updated 6 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆66Updated 6 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆53Updated 3 months ago
- A bunch of scripts I use to work with urlscan.io☆33Updated 5 years ago
- 504 VSAgent☆23Updated 7 years ago
- Security Onion Elastic Stack☆46Updated 4 years ago
- Test a network's egress controls with various levels of success and failure.☆104Updated 2 years ago
- ☆59Updated 5 years ago
- Slides from my ShellCon Talk, OSINT for Pen Tests, given 10/19.☆61Updated 7 years ago
- CloudBurst is a red team framework for interacting with cloud providers to capture, compromise, and exfil data.☆36Updated 6 years ago
- Sysmon config for both Windows and Linux Devices. Windows one is a bit dated☆55Updated 7 months ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 3 years ago
- ☆98Updated 6 years ago
- Speeds up the extraction of password hashes from ntds.dit files. For use with the ntdsxtract project or the dshash script☆27Updated last year
- Open Red Team Bag of Tricks - Red Teaming and Pentesting cheat sheet and trick book☆96Updated 8 years ago
- Six Degrees of Domain Admin☆15Updated 7 years ago
- No-Script Automation Tool☆56Updated 6 years ago
- Generate ATT&CK Navigator layer file from PowerShell Empire agent logs☆49Updated 6 years ago
- Analysis of wifi probe request data☆11Updated 7 years ago
- Browse and search through nmap's NSE scripts.☆60Updated 7 years ago
- Comprehensive Pivoting Framework☆20Updated 8 years ago
- Automated enumeration☆30Updated 3 years ago
- NebulousAD automated credential auditing tool.☆154Updated 4 years ago
- Mitre Att&ck Technique Emulation☆82Updated 5 years ago
- Scan for and exploit Consul agents☆40Updated 5 years ago
- The initial conversation slides and menu of scenarios☆38Updated 3 years ago
- Schillings SwordPhish empowers organisations and engages its employees to establish the key component of any cyber security strategy: th…☆108Updated 7 years ago
- Automatic Sender Policy Framework Reconnaissance☆18Updated 6 years ago
- Collection of scripts for interacting with AD Kerberos from Linux☆72Updated 6 years ago