adityaks / strafer
Strafer: A tool to detect potential infections in Elasticsearch instances
☆27Updated 4 years ago
Alternatives and similar repositories for strafer:
Users that are interested in strafer are comparing it to the libraries listed below
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- ☆34Updated 2 months ago
- Audit Powershell and search from known keywords in history #Blueteam☆25Updated 4 years ago
- Simple Live Data Collection Tool☆21Updated 4 years ago
- Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests☆21Updated 7 years ago
- A defense tool - detect web shells in local directories via md5sum☆33Updated 5 years ago
- Interactive Post Exploitation Tool☆36Updated 5 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Updated 4 years ago
- ☆22Updated 4 years ago
- ☆25Updated 3 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Updated 4 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Updated 5 years ago
- ☆16Updated 5 years ago
- ☆15Updated 3 years ago
- Deploy an "illegal" SOC to manage vulnerabilities on your city servers in minutes.☆19Updated 2 years ago
- Free and open cyber-security auditing tool with collective intelligence☆21Updated 5 years ago
- A JavaScript components vulnerability scanner, based on RetireJS☆36Updated 4 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- A rogue DNS detector☆23Updated last year
- Perform various SMB-related attacks, particularly useful for testing large Active Directory environments.☆40Updated 2 years ago
- A collection of scripts for the purpose of gathering open source intelligence, to be presented at GrayHat, BSides Denver, and Information…☆25Updated 4 years ago
- Exploit for win10 SMB3.1☆17Updated 4 years ago
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.☆19Updated 2 years ago
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆24Updated 10 years ago
- Fuzzer for finding Open Mail Relays☆14Updated 4 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- Pure Honeypots with an automated bash script☆20Updated 3 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆36Updated 5 years ago
- OWASP Foundation Web Respository☆35Updated 3 years ago