airbus-seclab / nbutoolsView external linksLinks
Tools for offensive security of NetBackup infrastructures
☆43Jun 6, 2023Updated 2 years ago
Alternatives and similar repositories for nbutools
Users that are interested in nbutools are comparing it to the libraries listed below
Sorting:
- HashKitty is a user-friendly cross-platform Python wrapper for Hashcat designed to provide an easy password cracking experience for both …☆42Jul 18, 2024Updated last year
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆24Aug 21, 2023Updated 2 years ago
- Generate graphs and charts based on password cracking result☆163Feb 17, 2023Updated 2 years ago
- ☆26May 6, 2024Updated last year
- Accurately fingerprint and detect vulnerable (and patched!) versions of Netscaler / Citrix ADC to CVE-2023-3519☆85Jul 23, 2023Updated 2 years ago
- passat - password auditing tool. Does statistical analyses on large sets of cracked passwords.☆25Feb 8, 2022Updated 4 years ago
- xortigate-cve-2023-27997☆65Oct 12, 2023Updated 2 years ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆98Apr 13, 2023Updated 2 years ago
- An eBPF detection program for CVE-2022-0847☆29Jul 5, 2022Updated 3 years ago
- Simple S3 Bucket Testing Software☆31Nov 4, 2021Updated 4 years ago
- ☆12Feb 24, 2023Updated 2 years ago
- ccm - A small python library that helps identify vulnerabilities inside of encrypted data☆11Aug 17, 2020Updated 5 years ago
- Tools for preservation of floppy disks☆11Nov 22, 2025Updated 2 months ago
- It provides configurable shortcuts to help make the pre-qual/testing process more efficient.☆11Nov 19, 2022Updated 3 years ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 3 years ago
- A utility to force query DNS over DoH off of CloudFlare API when DNS block is in place☆10Aug 26, 2018Updated 7 years ago
- Some scripts to support with importing large datasets into BloodHound☆81Nov 28, 2023Updated 2 years ago
- Some scripts for attacks on Tacacs+ protocol☆66Aug 27, 2019Updated 6 years ago
- masscan with exclusive excludes☆58Nov 8, 2023Updated 2 years ago
- Simple tool to identify and remediate the use of the AWS EC2 IMDSv1.☆15Aug 12, 2021Updated 4 years ago
- Proof of concept exploit for Ivanti EPM CVE-2024-13159 and others☆13Feb 19, 2025Updated 11 months ago
- ☆11Dec 22, 2020Updated 5 years ago
- Scanner for CVE-2024-4040☆51May 17, 2024Updated last year
- ☆25Nov 2, 2021Updated 4 years ago
- ☆26Jun 2, 2022Updated 3 years ago
- Canary Hunter aims to be a quick PowerShell script to check for Common Canaries in various formats generated for free on canarytokens.org☆124Nov 9, 2022Updated 3 years ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts☆127Dec 23, 2025Updated last month
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Apr 19, 2017Updated 8 years ago
- Haschcat Rules processor☆14Mar 22, 2023Updated 2 years ago
- ☆12Dec 23, 2021Updated 4 years ago
- ☆15Jan 26, 2023Updated 3 years ago
- Automation script to download JSON MISP files from a SFTP server and import them via API to a MISP instance.☆15May 12, 2023Updated 2 years ago
- ☆12Oct 5, 2025Updated 4 months ago
- An analysis of the user password hashing algorithm used by Citrix NetScaler☆15Sep 23, 2025Updated 4 months ago
- Convert gpsxml files to png files which can be opened in Qgis☆13Aug 16, 2016Updated 9 years ago
- ☆14Feb 4, 2024Updated 2 years ago
- Python script for SAP secure storage decrypton☆13Mar 14, 2018Updated 7 years ago
- Use YARA rules on Time Travel Debugging traces☆96Jul 11, 2023Updated 2 years ago