aau-network-security / haaukinsLinks
A Highly Accessible and Automated Virtualization Platform for Security Education
☆190Updated last week
Alternatives and similar repositories for haaukins
Users that are interested in haaukins are comparing it to the libraries listed below
Sorting:
- Free and open NMAP NSE script to query vulnerabilities via the cve-search.org API.☆250Updated 5 years ago
- nray distributed port scanner☆156Updated last month
- This repo contains logstash of various honeypots☆174Updated 5 years ago
- a low(zero) cost threat intelligence&response tool against phishing domains☆157Updated 2 years ago
- Real Time Threat Monitoring Tool☆112Updated 2 years ago
- useful pentest note☆67Updated last week
- Network assessment tool for various UDP Services covering both IPv4 and IPv6 protocols☆115Updated 5 years ago
- Search an exploit in the local exploitdb database by its CVE☆174Updated 2 years ago
- ☆48Updated 4 years ago
- Python automation of Docker.sock abuse☆212Updated 2 years ago
- Phishing Simulation mainly aims to increase phishing awareness by providing an intuitive tutorial and customized assessment☆140Updated 3 years ago
- an asynchronous target enumeration tool☆244Updated 2 years ago
- A forensic evidence acquirer☆86Updated 4 years ago
- A wrapper for Nmap to quickly run network scans☆147Updated 4 years ago
- Detect and log CVE-2019-19781 scan and exploitation attempts.☆117Updated 5 years ago
- Capture, upload and analyze network traffic; powered by PacketTotal.com.☆96Updated 5 years ago
- Scripts to execute enumeration via LFI☆89Updated 6 years ago
- BlueKeep scanner supporting NLA☆167Updated 6 years ago
- GreyNoise Query Language☆82Updated 6 years ago
- Red Teaming :: Penetration Testing :: Offensive Security :: OSCP :: OSCE :: CheatSheets :: Tools :: etc...☆147Updated 6 years ago
- DEF CON 26 Workshop - Attacking & Auditing Docker Containers Using Open Source☆108Updated 5 years ago
- Linux post exploitation privilege escalation enumeration☆257Updated 4 years ago
- Linux Privilege Escalation Tool☆184Updated 6 years ago
- A modular OSINT honeypot for blue teamers☆337Updated 2 years ago
- thethe☆116Updated 4 years ago
- A Linux enumeration script for Hack The Box☆191Updated 5 years ago
- Routopsy - Hacking Routers with Routers☆177Updated 4 years ago
- Bash Proof-of-Concept (PoC) script to exploit SIGRed (CVE-2020-1350). Achieves Domain Admin on Domain Controllers running Windows Server …☆104Updated 5 years ago
- Small CTF challenges running on Docker☆159Updated 7 years ago
- An organizational asset and vulnerability management tool, with Jira integration, designed for generating application security reports.☆182Updated last week