alexfrancow / A-DetectorView external linksLinks
An anomaly-based intrusion detection system.
☆85Dec 8, 2022Updated 3 years ago
Alternatives and similar repositories for A-Detector
Users that are interested in A-Detector are comparing it to the libraries listed below
Sorting:
- Library Secruity dependency Checker☆12Sep 13, 2019Updated 6 years ago
- Generate pentest reports based on github issues.☆16Dec 8, 2022Updated 3 years ago
- Abusing SketchUp to make persistence on Windows☆21Mar 26, 2019Updated 6 years ago
- Disposable Kali Linux containers for Mercury ISS / pentesting engagements.☆38Aug 21, 2019Updated 6 years ago
- Dumain Bruteforcer - a fast and flexible domain bruteforcer☆52Sep 19, 2018Updated 7 years ago
- Discover target social media profiles☆81Sep 26, 2022Updated 3 years ago
- Minimal docker container of Parrot OS for running an automated scan & pentest report.☆193Jul 13, 2023Updated 2 years ago
- vulnerable single sign on☆150Aug 1, 2024Updated last year
- Exploit PoC for CVE's and non CVE's alike☆22Jul 24, 2020Updated 5 years ago
- Powershell script to exfiltrate large files quickly and securely☆125May 4, 2022Updated 3 years ago
- ☆25Jul 5, 2018Updated 7 years ago
- ☆11Aug 19, 2017Updated 8 years ago
- Reverse shell container for k8s deployments☆49Feb 21, 2020Updated 5 years ago
- PowerShell based Active Directory Honey User Account Management with Universal Dashboards☆141Jun 26, 2019Updated 6 years ago
- Convert the loot directory of ntlmrelayx into an enum4linux like output☆22Apr 12, 2020Updated 5 years ago
- IDS/IPS malware download evasion☆15Feb 21, 2019Updated 6 years ago
- ☆15May 23, 2019Updated 6 years ago
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆36Dec 9, 2019Updated 6 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Oct 7, 2024Updated last year
- Checks using a test string if a Cloudflare DNS bypass is possible using CloudFail.☆48Dec 17, 2020Updated 5 years ago
- Gogs CVEs☆80Nov 30, 2019Updated 6 years ago
- A Bash script which uses AWS CLI to create an image of an AWS EC2 volume☆29Jan 1, 2024Updated 2 years ago
- An email client in CLI, designed specifically for spearphishing.☆13Jul 25, 2019Updated 6 years ago
- Serverless function to automate enforcement of Multi-Factor Authentication (MFA) to all AWS IAM users with access to AWS Management Conso…☆13Oct 30, 2018Updated 7 years ago
- OrFinder is a tool which scan the internet to find open relay SMTPs☆15Aug 7, 2017Updated 8 years ago
- Adhoc scripts☆29Feb 12, 2017Updated 9 years ago
- A command line tool and a library to generate TLS certificates for development purposes.☆36Jul 5, 2021Updated 4 years ago
- High performance WordPress login bruteforcer with automatic concurrency for maximum amount of tries per second.☆78Feb 23, 2020Updated 5 years ago
- ☆22Aug 31, 2016Updated 9 years ago
- ☆15Jan 8, 2020Updated 6 years ago
- ☆14Aug 31, 2021Updated 4 years ago
- Two Proof-Of-Concepts of SUID binary vulnerabilities on BMC Patrol allowing to elevate privileges from any linux user to root.☆12Jun 29, 2020Updated 5 years ago
- Is this IP a C2 server?☆28Apr 21, 2020Updated 5 years ago
- A tool to analyse JMX API security level.☆43Jul 23, 2014Updated 11 years ago
- Linux AV tests☆13Apr 23, 2019Updated 6 years ago
- Some talks about security☆13Nov 20, 2020Updated 5 years ago
- gtfo, now with the speed of golang☆62Jun 8, 2020Updated 5 years ago
- Hamburglar -- collect useful information from urls, directories, and files☆319Jan 3, 2026Updated last month
- FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network …☆678Oct 28, 2023Updated 2 years ago