c2theg / srvBuilds
scripts to setup servers, as quickly as possible
☆9Updated 2 months ago
Related projects ⓘ
Alternatives and complementary repositories for srvBuilds
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆20Updated 3 years ago
- mud-visualizer is a tool to visualize MUD files☆9Updated 2 years ago
- Minimalistic DNS logging tool☆43Updated 2 years ago
- This Shell script can create a chrooted environment along with a SSH Jail for the same. This can be used either for a single user jail or…☆18Updated 7 years ago
- Proof-Of-Concept SSH Worm. Not for illegal use.☆14Updated 6 years ago
- A fully featured Windows backdoor that uses email as a C&C server☆15Updated 7 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 8 years ago
- Pure Honeypots with an automated bash script☆19Updated 3 years ago
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆15Updated 3 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated last month
- A tool for Pentesters & BugHunters to collect IPs of company, server, Operating System & many more☆12Updated last year
- Brute Force and Scan WinRm Service☆13Updated 4 years ago
- Tor bridge running obfs4 obfuscation protocol in Alpine 🐳☆8Updated 9 months ago
- Scans through registry hives outputting entropy values for key/values, dumps binary contents to files...we are looking for those "fileles…☆11Updated 5 years ago
- Collection of malware ioc hashes from blog posts. A Python script is provided to search through it.☆17Updated 4 years ago
- A simple low-interaction port monitoring honeypot.☆17Updated 4 years ago
- masscan result parsing, web server fingerprinting☆19Updated 2 years ago
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated last year
- Search bing with python☆11Updated 10 years ago
- Launch a Windows EXE file with this EXE file (application filter evasion)☆11Updated 7 years ago
- Log4j-Scanner with Bind-Receipt and custom hostnames☆18Updated 2 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆11Updated 4 years ago
- Get a list of installed software in a safe manner☆11Updated 7 years ago
- DNS logging, detection, ...☆15Updated 2 years ago
- Python framework for manipulating bulk WHOIS data from RIRs☆19Updated 2 years ago