chrissistrunk / SecurityAxioms
This is a list of Computer and Network Security Axioms
☆29Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for SecurityAxioms
- ☆17Updated 7 years ago
- Proof of concept VBA code to add to Normal.dot to put restrictions on Word☆41Updated 7 years ago
- ☆112Updated 7 years ago
- SMTP server / sinkhole for collecting spam☆44Updated 6 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Updated 7 years ago
- A tool for importing vulnerability scanner data and then allowing you to manipulate the risks, affected hosts, and create risk ordered ou…☆78Updated 5 months ago
- An offensive Powershell console☆30Updated 8 years ago
- I read 20 years of mostly-fail at cyber norms at the UN, and now you can too!☆21Updated 6 years ago
- Development guide for Volatility Plugins☆23Updated 7 years ago
- This tool will extract useful information from the McAfee update SiteList file and decrypt the associated password for each entry.☆26Updated 6 years ago
- ☆25Updated 7 years ago
- ☆98Updated 5 years ago
- ☆52Updated 6 years ago
- ☆97Updated 8 years ago
- A collection of infosec related scripts and information.☆53Updated last month
- Comprehensive Pivoting Framework☆20Updated 8 years ago
- ☆46Updated 7 years ago
- Git Web Hook Tunnel for C2☆28Updated last year
- A simplified SMB Email Client Attack script used for pentests.☆30Updated 5 years ago
- Performs OCR on image files and scans them for matches to YARA rules☆40Updated 6 years ago
- A framework to generate unique test cases based on code snippets to test techniques☆56Updated 3 years ago
- Common Findings Database☆100Updated 5 years ago
- The documents☆55Updated 7 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- Generate ATT&CK Navigator layer file from PowerShell Empire agent logs☆49Updated 6 years ago
- Cowrie Honeypot Obscurer☆17Updated 4 years ago