XalfiE / Nix-Auditor
Nix Audit made easier (RHEL, CentOS)
☆64Updated this week
Alternatives and similar repositories for Nix-Auditor:
Users that are interested in Nix-Auditor are comparing it to the libraries listed below
- ☆61Updated 7 years ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Updated 7 years ago
- Test a network's egress controls with various levels of success and failure.☆104Updated 2 years ago
- Computer Network Defender's Toolkit, specializing in active defense techniques.☆7Updated 5 years ago
- Transform NMap Scans to an D3.js HTML Table☆59Updated 7 years ago
- WhiteBox CMS analysis☆69Updated last year
- Analyse SQL injection attempts in web server logs☆82Updated 8 years ago
- Express security essentials deployment for Linux Servers☆58Updated 4 years ago
- ☆92Updated 6 years ago
- Identify compromised domains or emails. A python based HIBP and HackedEmails wrapper☆38Updated 6 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆72Updated 6 years ago
- Smoking Linux Every Day!☆54Updated 4 years ago
- malicious file maker/sender to create and send malicious attachments to test your email filter/alerting☆69Updated 7 years ago
- Herramienta escrita en Python y utilizando la librería Scapy basada en Yersinia para la implementación de ataques de capa de enlace de da…☆60Updated 5 years ago
- Common Findings Database☆100Updated 5 years ago
- Extreme Vulnerable Node Application☆95Updated 6 years ago
- Security Onion Elastic Stack☆46Updated 4 years ago
- Modern Honey Network App for Splunk☆50Updated 5 years ago
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆105Updated 10 years ago
- Generate MS Word template-based reports with HP WebInspect / Burp Suite Pro input, own custom data and knowledge base.☆67Updated last year
- Open Red Team Bag of Tricks - Red Teaming and Pentesting cheat sheet and trick book☆96Updated 8 years ago
- A shell script that automatically performs a series of *NIX enumeration tasks.☆40Updated 4 years ago
- BTG's purpose is to make fast and efficient search on IOC☆70Updated 6 years ago
- Vulnerability scanner based on vulners.com audit API☆65Updated 6 years ago
- A Report Generation Tool for Security Assessment☆64Updated 6 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆54Updated 5 months ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Updated 7 years ago
- Six Degrees of Domain Admin☆15Updated 7 years ago
- You're a #pentester and you totally pwn that linux box, congrats! Now what? You can launch gimmecredz.sh which will try to extract all p…☆169Updated 5 years ago
- Nmap enumeration and script scan automation script☆38Updated 2 years ago