anvilsecure / dawgmon
dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software
☆56Updated 5 years ago
Alternatives and similar repositories for dawgmon:
Users that are interested in dawgmon are comparing it to the libraries listed below
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 8 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Updated 6 years ago
- Tool orchestrator. Specify targets and run sets of tools against them.☆19Updated 8 years ago
- A tool for netpens.☆29Updated 5 years ago
- The SSH Multiplex Backdoor Tool☆63Updated 5 years ago
- first commit☆20Updated last year
- Bash scripts to help setup port redirects with iptables☆16Updated 7 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 3 years ago
- ☆50Updated 6 years ago
- This repository contains free Hybrid Analysis contributions to the IT-Security community☆27Updated 3 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- simple plugin to detect shellcode on Bro IDS with Unicorn☆33Updated 7 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago
- Passive Network Audit Framework☆32Updated 6 years ago
- ☆25Updated 8 years ago
- Six Degrees of Domain Admin☆15Updated 7 years ago
- Nessus Vulnerability visualization for the web☆31Updated 8 years ago
- A tiny chrome extension to record and replay your web application proof-of-concepts.☆20Updated 8 years ago
- ☆15Updated 8 years ago
- I read 20 years of mostly-fail at cyber norms at the UN, and now you can too!☆21Updated 6 years ago
- Honeybrid is a network application built to 1) administrate network of honeypots, and 2) transparently redirect live network sessions (TC…☆31Updated 6 years ago
- Vulnerability Assessment and Auditing Framework for all the Crypto Implementations.☆37Updated 8 years ago
- A tool to catch spoofed NBNS responses.☆50Updated 6 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 4 years ago