cmc / eastwoodLinks
newly registered domain name/brand infringement detector
☆23Updated 3 years ago
Alternatives and similar repositories for eastwood
Users that are interested in eastwood are comparing it to the libraries listed below
Sorting:
- checks site content against known good ssdeep hash, identifies matches☆10Updated 6 years ago
- Environmental (and http) keying for scripting languages☆39Updated 6 years ago
- Gophish Python cli to perform huge phishing campaigns☆40Updated 6 years ago
- Talk given at DerbyCon and RuxCon 2016☆22Updated 8 years ago
- ☆59Updated 6 years ago
- B-Sides CBR 2018 talk about group policy and Grouper☆39Updated 6 years ago
- SilkETW & SilkService☆40Updated 5 years ago
- ☆16Updated 7 years ago
- Slack/Microsoft Teams notification for new Empire/Meterpreter checkins☆25Updated 7 months ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆54Updated 7 months ago
- Scan web server for known webshell names and responses☆50Updated 8 years ago
- A tool to catch spoofed NBNS responses.☆50Updated 7 years ago
- Watches for trigger packets, runs commands or spawns a shell☆24Updated 6 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Updated 7 years ago
- Crack your macros like the math pros.☆33Updated 8 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆26Updated 10 years ago
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆30Updated 7 years ago
- Comprehensive Pivoting Framework☆20Updated 8 years ago
- Scripts for automating actions in Cobalt Strike☆11Updated 8 years ago
- ☆19Updated 8 years ago
- Apfell C2 Server for the Google Chrome Extension Payload☆11Updated 4 years ago
- A set of compiled application restriction bypasses☆29Updated 8 years ago
- Analysis of wifi probe request data☆11Updated 7 years ago
- meterpreter connetion☆22Updated 7 years ago
- Oracle Attacks Tool☆13Updated 8 years ago
- Vulnerability Assessment and Penetration Testing Toolkit☆18Updated 3 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Updated 6 years ago
- Loads the AutoIt DLL and PowerShell assemblies into memory and executes the specified keystrokes☆61Updated 7 years ago
- Example VBA Macro for MacOS Mojave☆67Updated 6 years ago
- Quick PoC I Wrote for Bypassing Next Gen AV Remotely for Pentesting☆41Updated 6 years ago