abirtone / STB
Security Tool Builder: project to automate the building of hacking tools
☆21Updated 2 years ago
Alternatives and similar repositories for STB:
Users that are interested in STB are comparing it to the libraries listed below
- Snort_rules detection bad actors.☆28Updated 6 months ago
- ☆12Updated 8 years ago
- Passive Network Audit Framework☆32Updated 6 years ago
- Coleccion de IRM de Societe Generale traducidos por mí al Español☆34Updated 7 years ago
- tmp files from tmp notes as tmp-pocs... ;)☆16Updated 2 years ago
- A client/server style agent meant for testing connectivity to and from a machine on a network.☆20Updated 7 years ago
- OSINT tool to evaluate the trustworthiness of a company☆42Updated 5 years ago
- Terminal Forensics CheatSheets☆12Updated 9 years ago
- My collection of dockerfiles☆24Updated 9 years ago
- Automated Memory Forensic☆35Updated 6 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Updated 7 years ago
- Batch scripts to capture volatile and log information from a target system☆19Updated 10 years ago
- ☆30Updated 6 years ago
- Generates payloads using msfvenom and open multi handler listener☆11Updated 7 years ago
- Bluewall is a firewall framework designed for offensive and defensive cyber professionals.☆106Updated 5 years ago
- Shodan.io Command Line Interface☆44Updated 3 years ago
- Tool to identify all domains contained in an IP anonymously☆15Updated 7 years ago
- Easy way to create a MISP event related to a Phishing page☆17Updated last year
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 3 years ago
- Sample list of penetration test reports☆17Updated 8 years ago
- Digital Forensics and Incident Response Wiki☆40Updated 10 years ago
- Smoking Linux Every Day!☆54Updated 4 years ago
- python_dark_web☆27Updated 5 years ago
- Use DNS to hunt for threats including DGAs☆15Updated 9 years ago
- pentestscripts☆16Updated 5 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Updated 6 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Updated 5 years ago
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆66Updated 5 years ago
- CPH:SEC - Copenhagen Ethical Hacking and Penetration Testing Society☆43Updated 2 years ago
- An installation script to help with the setup of a Kali VM for The Hacker Playbook: Practical Guide To Penetration Testing by Peter Kim☆17Updated 9 years ago