ccss-sandia / antfarmView external linksLinks
Passive network mapping tool written in Ruby
☆15Apr 8, 2014Updated 11 years ago
Alternatives and similar repositories for antfarm
Users that are interested in antfarm are comparing it to the libraries listed below
Sorting:
- A toolkit to attack Office365☆16Aug 1, 2019Updated 6 years ago
- A collection of phishing techniques used to evade detection. #nolockdown☆23Aug 28, 2025Updated 5 months ago
- A collection of powershell scripts that are designed to be ran from a Microsoft Defender for Endpoint Live Response terminal, utilizing o…☆12Apr 26, 2023Updated 2 years ago
- Automatic cloud backup of Kali Linux data☆12Feb 27, 2020Updated 5 years ago
- Unofficial mirror of GNUK's submodule: Chopstx☆12Aug 15, 2020Updated 5 years ago
- ChessDragon136's Unoficcial MediaBrowser 3 client for Samsung TV's☆10Dec 24, 2015Updated 10 years ago
- My own custom payloads for any BAD USB. (These payloads work perfectly with Arduino, Pi Pico, & Rubber Ducky.☆13Jan 19, 2023Updated 3 years ago
- A list of all known CoDeSys PLCs, along with notes regarding what version, what protocols and ports are used on each.☆14May 5, 2023Updated 2 years ago
- Zeek Profinet I/O Context Manager Parser - CISA ICSNPP☆13Nov 19, 2025Updated 2 months ago
- A plugin for the PS3 Media Server which allows you to browse and listen SoundCloud on your PS3☆26Oct 31, 2010Updated 15 years ago
- Methods for attacking KeePass 2.X databases, including extracting of encryption key material from memory.☆11Apr 2, 2022Updated 3 years ago
- ☆14Aug 13, 2019Updated 6 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Jan 19, 2014Updated 12 years ago
- Oracle Attacks Tool☆13Aug 9, 2016Updated 9 years ago
- ☆15Dec 4, 2023Updated 2 years ago
- This is the code bundle of Penetration Testing with Raspberry Pi, Second-Edition book☆10Jan 14, 2021Updated 5 years ago
- Decentralized DNS fuzzer to mitigate ISP Snooping☆13May 3, 2017Updated 8 years ago
- IEC104 Client for Metasploit☆11Aug 6, 2018Updated 7 years ago
- Add context menu to quickly open things with Sublime Text☆11Feb 22, 2020Updated 5 years ago
- Tools to work with vulnerability standards.☆19Mar 19, 2014Updated 11 years ago
- Ruby gem to check to see if an email address is on http://haveibeenpwned.com☆17Oct 26, 2017Updated 8 years ago
- Image Payload Creating/Injecting tools☆13Jun 6, 2021Updated 4 years ago
- logging data/testing devices for Wiegand Interface. Similar to the Tastic RFID Thief, Blekey, and ESPKey.☆20Jan 24, 2026Updated 3 weeks ago
- Import Bro logs from SecurityOnion into Logstash☆15Nov 10, 2015Updated 10 years ago
- ☆17Sep 17, 2020Updated 5 years ago
- Automate tracks download from Deezer☆11Jun 29, 2015Updated 10 years ago
- ☆13Oct 27, 2020Updated 5 years ago
- Confluence Hardcoded Password POC☆15Jul 30, 2022Updated 3 years ago
- Open source tool that uses censys and shodan for passive recon.☆13May 20, 2016Updated 9 years ago
- Presentation Slides and Resources☆16Jun 12, 2024Updated last year
- Extra cool effects for the Activate Power Mode Package☆11Jul 12, 2023Updated 2 years ago
- Scripts and outputs for ATLAS data in STIX JSON and ATT&CK Navigator layer formats☆23Feb 6, 2026Updated last week
- Jboss Java Deserialization RCE (CVE-2017-12149)☆13Aug 22, 2019Updated 6 years ago
- Provides situational awareness of Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) networks in suppo…☆1,028Feb 24, 2020Updated 5 years ago
- Shodanwave - Netwave IP Camera☆18Nov 18, 2017Updated 8 years ago
- Reading List for CSIRT Team Members☆17Oct 21, 2019Updated 6 years ago
- bash script to enumerate vulnerabilities on specific year through Shodan API☆46Dec 5, 2018Updated 7 years ago
- Point-and-click authoring tool for Gimp plugins☆25May 9, 2011Updated 14 years ago
- RDP auditing script☆16Jul 22, 2025Updated 6 months ago