abhinavbom / Metasploit-Penetration-Testing-Cookbook-Codes
Following repository contains source codes used in my two Books.
☆11Updated 9 years ago
Alternatives and similar repositories for Metasploit-Penetration-Testing-Cookbook-Codes:
Users that are interested in Metasploit-Penetration-Testing-Cookbook-Codes are comparing it to the libraries listed below
- A few quick recipes for those that do not have much time during the day☆22Updated 6 months ago
- The FastIR Server is a Web server to schedule FastIR Collector forensics collect thanks to the FastIR Agent☆12Updated 8 years ago
- FastIR Agent is a Windows service to execute FastIR Collector on demand☆14Updated 8 years ago
- Automated Static Analysis Framework☆9Updated 3 years ago
- Finding Valuable Needles in Global Source Code Haystacks with Automation☆17Updated 4 years ago
- HoneyDB Python Module☆13Updated last year
- Yara Scanner For IMAP Feeds and saved Streams☆28Updated 5 years ago
- Python parser for Red Canary's Atomic Red Team Yamls☆27Updated 6 years ago
- Subscriptions to collect Windows Event Logs mapped to the MITRE ATT&CK model☆12Updated 4 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆30Updated 6 years ago
- (Unofficial) Python API for https://sslbl.abuse.ch/☆11Updated 8 years ago
- Six Degrees of Domain Admin☆15Updated 7 years ago
- This repository is a curated list of pro bono incident response entities.☆20Updated last year
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- Docker container for datasploit framework☆26Updated 7 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 4 years ago
- Oracle Attacks Tool☆13Updated 8 years ago
- A collection of useful scripts☆24Updated 6 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆42Updated 4 years ago
- Web based analysis platform for use with the AWS_IR command line tool.☆17Updated 8 years ago
- ☆14Updated 6 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated last year
- ☆11Updated 8 years ago
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Updated 3 years ago
- Crack your macros like the math pros.☆33Updated 8 years ago
- Build your own threat hunting maturity model☆11Updated 7 years ago
- Python bindings for Yeti's API☆18Updated last year
- ☆11Updated 4 years ago
- Threat hunting repo for my independent study on threat hunting with OSQuery☆27Updated 7 years ago
- Script to parse Process Monitor XML log file, and give you a summary report.☆22Updated 9 years ago