abhinavbom / Metasploit-Penetration-Testing-Cookbook-Codes
Following repository contains source codes used in my two Books.
☆11Updated 9 years ago
Alternatives and similar repositories for Metasploit-Penetration-Testing-Cookbook-Codes:
Users that are interested in Metasploit-Penetration-Testing-Cookbook-Codes are comparing it to the libraries listed below
- A few quick recipes for those that do not have much time during the day☆22Updated 5 months ago
- Finding Valuable Needles in Global Source Code Haystacks with Automation☆17Updated 4 years ago
- Yara Scanner For IMAP Feeds and saved Streams☆28Updated 5 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- Python parser for Red Canary's Atomic Red Team Yamls☆27Updated 6 years ago
- The FastIR Server is a Web server to schedule FastIR Collector forensics collect thanks to the FastIR Agent☆12Updated 7 years ago
- Ansible module for OWASP ZAP using Python API to scan web targets for security issues☆14Updated 7 years ago
- HoneyDB Python Module☆13Updated last year
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- Python bindings for Yeti's API☆18Updated last year
- Automated Static Analysis Framework☆9Updated 3 years ago
- Web based analysis platform for use with the AWS_IR command line tool.☆17Updated 8 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆30Updated 6 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆42Updated 4 years ago
- FastIR Agent is a Windows service to execute FastIR Collector on demand☆14Updated 7 years ago
- Build Automated Machine Images for MISP☆28Updated last year
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 4 years ago
- introduction to distributed scanning using vultr☆11Updated 7 years ago
- This repository is a curated list of pro bono incident response entities.☆20Updated last year
- Script to parse Process Monitor XML log file, and give you a summary report.☆22Updated 8 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Updated 3 years ago
- (Unofficial) Python API for https://sslbl.abuse.ch/☆11Updated 8 years ago
- ☆12Updated 5 years ago
- Indices for courses in SANS' Network Security Operations curriculum☆15Updated 9 years ago
- ☆14Updated 6 years ago
- ☆30Updated 6 years ago
- Docker container for datasploit framework☆26Updated 7 years ago
- Six Degrees of Domain Admin☆15Updated 7 years ago
- ☆11Updated 4 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated last year