ch3k1 / squidmagicLinks
analyze a web-based network traffic 🕶 to detect central command and control servers
☆79Updated 7 years ago
Alternatives and similar repositories for squidmagic
Users that are interested in squidmagic are comparing it to the libraries listed below
Sorting:
- Simple website to display the LAN status based on a nmap scan☆58Updated 2 years ago
- Veil-Ordnance is a tool designed to quickly generate MSF stager shellcode☆72Updated 10 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Updated 8 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆67Updated 7 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆24Updated 8 years ago
- Tools for harvesting email addresses for phishing attacks |☆85Updated 10 years ago
- Analyse SQL injection attempts in web server logs☆82Updated 8 years ago
- Metasploit Usage Wiki☆47Updated 10 years ago
- Modular tool to test exfiltration techniques.☆37Updated 8 years ago
- Quick python script to automatically load NTLM hashes from Responder logs and fires up Hashcat to crack them☆80Updated 9 years ago
- uses keywords from alert logs to send SMS☆24Updated 10 years ago
- WeakNet PHP Execution Shell☆31Updated 10 years ago
- Transform NMap Scans to an D3.js HTML Table☆59Updated 8 years ago
- Collection of tools for web recon and enumeration.☆56Updated 10 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43Updated 8 years ago
- Basic Maltego Transforms for looking up SSL certs and IP info from censys.io☆41Updated 8 years ago
- A fully featured malware scanner for Linux desktops and servers.☆69Updated 3 years ago
- Simple IP Information Tools for Reputation Data Analysis☆23Updated 6 years ago
- A simple and effective phpmyadmin honeypot☆68Updated 7 years ago
- ☆25Updated 8 years ago
- ☆25Updated 10 years ago
- malicious file maker/sender to create and send malicious attachments to test your email filter/alerting☆69Updated 8 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆65Updated 9 years ago
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.☆43Updated 11 years ago
- Herramienta escrita en Python y utilizando la librería Scapy basada en Yersinia para la implementación de ataques de capa de enlace de da…☆61Updated 5 years ago
- Prometheus Firewall Analyzer☆48Updated 10 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 9 years ago
- Some simple and useful tools☆15Updated 7 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆45Updated 6 years ago
- Smoking Linux Every Day!☆56Updated 5 years ago