clayball / wily-possum
A firewall penetration testing tool suite.
☆11Updated 7 years ago
Alternatives and similar repositories for wily-possum:
Users that are interested in wily-possum are comparing it to the libraries listed below
- Linux and Windows Hardening Points☆12Updated 6 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Updated 7 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Overview about existing tools that can be useful for AWS auditing purposes.☆15Updated 7 years ago
- Framework for Automated Security Testing that is Scaleable and Asynchronous built on Microservices☆18Updated 8 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 6 years ago
- Yet-Another-BlueTeam-Repo-YABTR. A Repo for a collection of FREE Blue team tools for both windows and Linux.. Not vendor buy to defend pr…☆2Updated 5 years ago
- NMAP NSE that enumerates VNC authentication types☆14Updated 14 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19Updated 7 years ago
- Metasploit exploit suggester using OpenVAS XML output☆18Updated 6 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- Bash script to automate the installation and buildouts of OpenVPN servers and clients.☆6Updated 11 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆24Updated 6 years ago
- Ruby Oracle Security Scanner☆16Updated 12 years ago
- Six Degrees of Domain Admin☆15Updated 7 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- Phishing Toolkit☆20Updated 7 years ago
- Next Generation of White Chapel☆21Updated 10 years ago
- Educational Python penetration testing framework☆10Updated 7 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Updated 5 years ago
- Custom scripts used during the scenario☆21Updated 3 years ago
- Here comes the paintrain!☆11Updated 8 years ago
- Collection of single use scripts I worte for windows forensics☆27Updated 13 years ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆25Updated 7 years ago
- Some simple and useful tools☆15Updated 6 years ago
- A configurable OS shell command injection vulnerability testbed☆15Updated 11 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 9 years ago
- Tool orchestrator. Specify targets and run sets of tools against them.☆19Updated 8 years ago
- FastIR Agent is a Windows service to execute FastIR Collector on demand☆14Updated 7 years ago