abhinavbom / Metasploit-Penetration-Testing-Cookbook-CodesLinks
Following repository contains source codes used in my two Books.
☆11Updated 9 years ago
Alternatives and similar repositories for Metasploit-Penetration-Testing-Cookbook-Codes
Users that are interested in Metasploit-Penetration-Testing-Cookbook-Codes are comparing it to the libraries listed below
Sorting:
- Finding Valuable Needles in Global Source Code Haystacks with Automation☆17Updated 4 years ago
- HoneyDB Python Module☆13Updated last year
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 7 months ago
- Python bindings for Yeti's API☆18Updated last year
- Python parser for Red Canary's Atomic Red Team Yamls☆27Updated 6 years ago
- introduction to distributed scanning using vultr☆11Updated 8 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆30Updated 6 years ago
- Docker container for datasploit framework☆26Updated 7 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Updated 5 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Updated 3 years ago
- The FastIR Server is a Web server to schedule FastIR Collector forensics collect thanks to the FastIR Agent☆12Updated 8 years ago
- Automated Static Analysis Framework☆9Updated 3 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Updated 6 years ago
- ☆30Updated 6 years ago
- Ansible module for OWASP ZAP using Python API to scan web targets for security issues☆14Updated 7 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Updated 7 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Updated 8 years ago
- Overview about existing tools that can be useful for AWS auditing purposes.☆15Updated 7 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated last year
- Web based analysis platform for use with the AWS_IR command line tool.☆17Updated 8 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- This module installs and configures MISP (Malware Information Sharing Platform)☆13Updated last week
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆42Updated 4 years ago
- Six Degrees of Domain Admin☆15Updated 7 years ago
- (Unofficial) Python API for https://sslbl.abuse.ch/☆11Updated 8 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests☆21Updated 8 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- Yara Scanner For IMAP Feeds and saved Streams☆28Updated 5 years ago