cesbit / aiowmi
Python WMI Queries
☆27Updated last week
Related projects: ⓘ
- Python SPNEGO authentication library☆52Updated 2 weeks ago
- A Python-based client for the Cisco openVuln API☆27Updated last year
- A kerberos KDC HTTP/HTTPS proxy WSGI module☆60Updated 3 months ago
- A canary designed to minimize the impact from certain Ransomware actors☆98Updated 3 years ago
- [GITLAB MIRROR] Ludus is a system to build easy to use cyber environments for testing and development.☆27Updated this week
- Source code and examples for Antignis☆36Updated last year
- ☆21Updated 2 years ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆75Updated last year
- pam_python is a PAM module that runs the Python interpreter, and so allows PAM modules to be written in Python.☆22Updated 4 years ago
- Cisco IOS XE implant scanning & detection (CVE-2023-20198, CVE-2023-20273)☆37Updated 10 months ago
- Python3 scripts that executes an elf (Linux executable format) completely in memory.☆22Updated last year
- A multicast DNS and DNS Service Discovery Security Assessment Tool☆66Updated 9 months ago
- Identify servers running various SSL VPNs based on protocol-specific behaviors☆79Updated last month
- Clone network interface from one host as a tap interface on another host☆53Updated 3 years ago
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆37Updated 2 years ago
- Async dnsbl spam lists checker based on asyncio/aiodns.☆49Updated 2 weeks ago
- Pure-Python SNMP management tools☆53Updated 2 years ago
- Python DPAPI NG Decryptor for non-Windows Platforms☆53Updated last year
- egrets monitors egress☆45Updated 4 years ago
- BGP ranking is a free software to calculate the security ranking of Internet Service Provider (ASN)☆68Updated 2 months ago
- Ansible role to install auditbeat for security monitoring. (Ruleset included)☆15Updated 10 months ago
- This repo contains a list of vendors that hide their security advisories, alerts, notices, vulnerabilities, and more behind either a payw…☆31Updated 4 months ago
- ☆33Updated 9 months ago
- Check security aspects of a second-level domain name.☆14Updated 3 months ago
- This is a proof-of-concept of malicious software running inside of ModSecurity WAF.☆31Updated 2 years ago
- Decode obfuscated ldap_default_authtok from sssd.conf☆22Updated 5 years ago
- Asynchronous RDP client for Python (headless)☆145Updated 2 weeks ago
- A modern arpwatch replacement with JSON formatted outputs and easy options to exec commands when network changes are observed.☆30Updated 9 months ago
- IVRE's fork of the famous TCP port scanner. See below for details.☆40Updated 10 months ago
- Library and example applications for using/abusing the information-leaky L2Trace service on Cisco switches. PSIRT Advisory: cisco-sa-2019…☆3Updated last year