blacklanternsecurity / zmap-asset-inventoryLinks
Python script which takes internal asset inventory at scale using zmap. Outputs to CSV.
☆21Updated 3 years ago
Alternatives and similar repositories for zmap-asset-inventory
Users that are interested in zmap-asset-inventory are comparing it to the libraries listed below
Sorting:
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆55Updated 4 years ago
- Windows Security Logging☆43Updated 3 years ago
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Updated 4 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆40Updated 2 months ago
- A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo…☆20Updated 3 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆15Updated 8 years ago
- Continuous kerberoast monitor☆45Updated 2 years ago
- Scripts to threat optics stack quickly / abbreviated and automated. Run after APT-Lab-Terraform☆13Updated 4 years ago
- ☆15Updated 3 years ago
- Virtual Security Operations Center☆51Updated 2 years ago
- Bloodhound Portable for Windows☆52Updated 2 years ago
- ☆70Updated 2 years ago
- This script runs multithreading module that connects to a remote TCP server, monitors active (opened) Microsoft Word documents (.doc,.doc…☆33Updated 5 years ago
- Bunch of honey related items that spoof/decoy powersploit functions.☆18Updated 5 years ago
- Threat Mitigation Strategies☆25Updated last month
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆35Updated 3 years ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated 2 years ago
- Reproducible and extensible BloodHound playbooks☆44Updated 5 years ago
- My Python Cookiecutter project template☆32Updated 3 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated last year
- BloodHound Data Scanner☆45Updated 5 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆17Updated 4 years ago
- Automatic detection engineering technical state compliance☆55Updated last year
- Kibana app for RedELK☆17Updated 2 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated last year
- ☆18Updated 3 years ago
- Clean public password dump files and store in ELK☆38Updated 7 years ago
- Serving files with conditions, serverside keying and more.☆18Updated 3 years ago
- A simple program to query nmap xml files in the terminal.☆27Updated 5 years ago