Strafer: A tool to detect potential infections in Elasticsearch instances
☆27Mar 14, 2021Updated 5 years ago
Alternatives and similar repositories for strafer
Users that are interested in strafer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Router socks. One port socks for all the others.☆69May 22, 2024Updated last year
- Site fast fuzzing with chorme extension.☆24Feb 4, 2022Updated 4 years ago
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆31Jan 17, 2022Updated 4 years ago
- WordPress version scanner written in Python.☆15Jun 18, 2024Updated last year
- A forensic evidence acquirer☆86Apr 14, 2021Updated 4 years ago
- vPrioritizer enables us to understand the contextualized risk (vPRisk) on asset-vulnerability relationship level across the organization,…☆69Jul 9, 2025Updated 8 months ago
- A simple reconnaissance framework for bug bounty hunting☆37Oct 16, 2020Updated 5 years ago
- Simple Bash script to retrieve basic system information.☆30Apr 14, 2018Updated 7 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆32Oct 11, 2020Updated 5 years ago
- Botnet Simulation Framework☆78Aug 6, 2020Updated 5 years ago
- Bunch of honey related items that spoof/decoy powersploit functions.☆18Apr 23, 2020Updated 5 years ago
- PowerShell 'Hero': scripts for DFIR and automation with a PowerShell menu example.☆37Jul 11, 2023Updated 2 years ago
- EventLogSilencer is a PowerShell script designed for disable Windows Event Logging☆18Oct 28, 2023Updated 2 years ago
- A web front-end for password cracking and analytics☆16Jan 6, 2019Updated 7 years ago
- thethe☆115Oct 21, 2020Updated 5 years ago
- PowerShell Script to facilitate the processing of SRUM data for on-the-fly forensics and if needed threat hunting☆23Oct 26, 2019Updated 6 years ago
- This is a repo for fetching Applocker event log by parsing the win-event log☆31Aug 6, 2022Updated 3 years ago
- ☆12Nov 21, 2023Updated 2 years ago
- Toolset for detecting reflected xss in websites☆16Oct 6, 2018Updated 7 years ago
- Subcert is a subdomain enumeration tool, that finds all the subdomains from certificate transparency logs.☆80Jun 28, 2021Updated 4 years ago
- Fast offline auditing of Active Directory passwords using Python.☆166Aug 14, 2024Updated last year
- ☆14Apr 9, 2019Updated 6 years ago
- [discontinued] Mass exploiter of CVE-2015-1579 for WordPress CMS☆28May 21, 2018Updated 7 years ago
- TheCl0n3r will allow you to download and manage your git repositories.☆51Oct 22, 2020Updated 5 years ago
- A curated list of awesome infosec resources.☆32May 31, 2015Updated 10 years ago
- wp content injection mass exploit Perl Script☆12Jul 11, 2017Updated 8 years ago
- A file system forensics analysis scanner and threat hunting tool. Scans file systems at the MFT and OS level and stores data in SQL, SQL…☆82Mar 25, 2024Updated last year
- Repo for Automations and other solutions for Elastic SIEM/Security.☆18Jun 15, 2021Updated 4 years ago
- ☆38Jan 3, 2022Updated 4 years ago
- WireBug is a toolset for Voice-over-IP penetration testing☆175Mar 30, 2022Updated 3 years ago
- A Rust implementation of the Handshake and Lightning Network secure messaging protocol - based on Noise.☆13Dec 9, 2019Updated 6 years ago
- automated password spraying tool☆148Jun 15, 2021Updated 4 years ago
- The NSE Script plugin integrates with Criminal IP CTI search engine for network scanning, showing IP details like WHOIS, running products…☆16Nov 29, 2023Updated 2 years ago
- Easily-guessable Password Generator for Password Spray Attack☆20Jun 4, 2020Updated 5 years ago
- Wordpress Plugin "WP Checkout" Mass exploit☆16Jun 18, 2017Updated 8 years ago
- Nuclei Templates☆14Jan 13, 2023Updated 3 years ago
- Brute-force script for finding azorult XOR key.☆14May 22, 2019Updated 6 years ago
- Your everyday Linux distribution gone Super Saiyan.☆62Oct 13, 2023Updated 2 years ago
- A collection of notes and rules (Snort/Suricata, Sigma, and YARA) to identify various samples of malware.☆14Sep 7, 2021Updated 4 years ago