Xtrato / Slypi
SlyPI
☆18Updated 11 years ago
Alternatives and similar repositories for Slypi:
Users that are interested in Slypi are comparing it to the libraries listed below
- Registry Based Artifact Collection and Correlation☆10Updated 9 years ago
- Collection of single use scripts I worte for windows forensics☆27Updated 12 years ago
- Metasploit Usage Wiki☆49Updated 9 years ago
- Digital Forensics and Incident Response Wiki☆40Updated 10 years ago
- Next Generation of White Chapel☆21Updated 10 years ago
- WPUpdate is a simple Linux service that automatically checks for a new version of Wordpress each night at 2AM.☆36Updated 10 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago
- Local privilege escalation scripts and tools☆16Updated 8 years ago
- ☆17Updated 10 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆32Updated 8 years ago
- Discover potential timestamps within the Windows Registry☆18Updated 10 years ago
- Just a collection of scripts☆40Updated 4 years ago
- Working Rsh Client With Bind/Reverse Shell☆20Updated 9 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 6 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Updated 8 years ago
- Reverse to use in a batfile which can call the ip and ports from itself☆24Updated 4 years ago
- µphisher spear phishing tool (reference implementation)☆38Updated 4 years ago
- #Pwn Linux (CrunchPwn) is a penetration testing repository/addition for CrunchBang Linux.☆27Updated 10 years ago
- ssh session type for metasploit☆98Updated last year
- Cross platform (i.e., Windows, Linux, Mac) assessment script. The script helps assess workstations for vulnerabilities and abnormalities.☆19Updated 9 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆24Updated 8 years ago
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Updated 7 years ago
- Recursively searches a directory for any file containing a specified string☆45Updated 9 years ago
- ☆17Updated 7 years ago
- Exploit Dev Wiki☆13Updated 11 years ago
- Educational Python penetration testing framework☆10Updated 6 years ago
- Windows Offline Common Password Hash Checker☆29Updated 8 years ago
- Weape-Wireless-EAP-Extractor☆27Updated 11 years ago
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Updated 14 years ago
- Cross Distribution Exploit Testing☆27Updated 9 years ago