F-Secure Lightweight Acqusition for Incident Response (FLAIR)
☆16Jul 5, 2021Updated 4 years ago
Alternatives and similar repositories for FLAIR
Users that are interested in FLAIR are comparing it to the libraries listed below
Sorting:
- visually see issues with supported cipher suites☆17Jun 18, 2024Updated last year
- Ansible role to deploy Cyberark Password Vault Web Access☆20Dec 1, 2025Updated 2 months ago
- Random Tips and Writeups.☆15Feb 21, 2019Updated 7 years ago
- A set of tools that allow researchers to experiment with certificate chain validation issues☆13Dec 4, 2019Updated 6 years ago
- DPE - Default Password Enumeration☆37Jun 3, 2013Updated 12 years ago
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- AWS Backup implementation in terraform☆13Feb 8, 2020Updated 6 years ago
- This project is aimed at freely providing technical guides on various hacking topics: Active Directory services, web services, servers, i…☆15Sep 18, 2020Updated 5 years ago
- A Ruby interface to standard cryptographic primitives☆19Oct 31, 2023Updated 2 years ago
- Privilege escalation challenges created for Harmonie-Technologie exhibition stand @ NDH16 (Paris)☆15Dec 26, 2019Updated 6 years ago
- A capture-the-flag exercise based on data analysis challenges☆19Jan 30, 2020Updated 6 years ago
- The project will serve as a central repository for VMware Threat Analysis Unit (TAU) to share threat intelligence with the security commu…☆17Mar 25, 2023Updated 2 years ago
- Cybersecurity Incidents Mind Maps☆34Sep 29, 2021Updated 4 years ago
- Dangling COM Keys Finder☆17Nov 16, 2021Updated 4 years ago
- A fast port scanner written in go with a focus on reliability and simplicity.☆21Oct 21, 2024Updated last year
- Create an incident response triage toolkit for use with Windows or Linux.☆18Jun 14, 2020Updated 5 years ago
- ☆15Feb 1, 2019Updated 7 years ago
- Left To My Own Devices - NT hash tools☆40Aug 4, 2022Updated 3 years ago
- REST API client to consume w3af☆17May 22, 2023Updated 2 years ago
- Cross-platform provider for Summon that talks to keyrings.☆17Nov 5, 2025Updated 3 months ago
- ☆21Nov 7, 2023Updated 2 years ago
- Network and web related exploratory playground.☆19Apr 6, 2016Updated 9 years ago
- Automate the creation of Backdoors and postexplotation activities☆23Jun 20, 2022Updated 3 years ago
- A resource monitor that records resource usage (e.g., CPU usage, RAM usage and free, disk I/O count, NIC speed, etc.) and outputs the dat…☆20Jan 11, 2017Updated 9 years ago
- HoneySAP: SAP Low-interaction research honeypot☆51May 1, 2023Updated 2 years ago
- SQL Injection without the pain of syringes.☆25Apr 20, 2017Updated 8 years ago
- Code and Slides of my BSides London 2019 presentation about Attacker Emulation using CALDERA☆22Jun 9, 2019Updated 6 years ago
- ScrapeAW is a framework that without API scrape IPs across the world using Shodan☆11May 16, 2024Updated last year
- Bash Recon Scan - Recon and Scan a network using Bash☆30Jun 19, 2022Updated 3 years ago
- ☆18Apr 16, 2015Updated 10 years ago
- #1 DISCORD AIO☆41Mar 10, 2024Updated last year
- PurpleSpray is an adversary simulation tool that executes password spray behavior under different scenarios and conditions with the purpo…☆51Aug 15, 2019Updated 6 years ago
- Discover "HotSpots" - potential spots for credentials theft☆24Apr 12, 2018Updated 7 years ago
- A generic DNS black hole zone generator☆21Nov 7, 2018Updated 7 years ago
- Docker Container to deploy Mitre Caldera Automated Adversary Emulation System☆26Sep 26, 2020Updated 5 years ago
- Posture Attribute Collection and Evaluation☆23Jun 20, 2023Updated 2 years ago
- All my slides for any talks☆23Oct 13, 2024Updated last year
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆32Aug 29, 2016Updated 9 years ago
- Streaming Unexpected Network Byte Sequences with High Probability of Blue Screening or Otherwise Crashing Attacker Command-and-Control No…☆22Jul 14, 2019Updated 6 years ago