delvelabs / bateaLinks
AI-based, context-driven network device ranking
☆300Updated last year
Alternatives and similar repositories for batea
Users that are interested in batea are comparing it to the libraries listed below
Sorting:
- Proofs of Concept. Just fucking around.☆193Updated 3 years ago
- This repo contains logstash of various honeypots☆174Updated 5 years ago
- Respounder detects presence of responder in the network.☆318Updated 6 years ago
- Red team & penetration testing tools to exploit the capabilities of Intel AMT☆258Updated 4 years ago
- nnposter's alternate fingerprint dataset for Nmap script http-default-accounts☆254Updated last week
- A collection of Ansible Playbooks that configure Kali to use Fish & install a number of tools☆163Updated 5 years ago
- LinkedIn reconnaissance tool☆54Updated 3 years ago
- Resolvn Threat Hunting Virtual Machine☆139Updated 6 years ago
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆607Updated last year
- Feed the tool a .nessus file and it will automatically get you MSF shell☆237Updated 2 years ago
- ☆394Updated 3 weeks ago
- Blue Team Scripts☆250Updated 6 years ago
- Brian's Pentesting and Technical Tips for You☆120Updated last year
- An Ansible playbook to provision a host for penetration testing and CTF challenges☆231Updated 3 years ago
- Linux privilege escalation checks (systemd, dbus, socket fun, etc)☆290Updated 6 years ago
- Orc is a post-exploitation framework for Linux written in Bash☆397Updated 5 years ago
- ☆282Updated 7 years ago
- Attack Surface Management since before Attack Surface Management was a thing☆649Updated this week
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆247Updated last year
- A script that automates generation of OpenSSL reverse shells☆302Updated 5 years ago
- Armory is a tool meant to take in a lot of external and discovery data from a lot of tools, add it to a database and correlate all of rel…☆418Updated 2 weeks ago
- NebulousAD automated credential auditing tool.☆154Updated 5 years ago
- A powerful target reconnaissance framework powered by graph theory.☆421Updated 2 years ago
- Sheepl : Creating realistic user behaviour for supporting tradecraft development within lab environments☆398Updated last year
- Easy 802.1Q VLAN Hopping☆381Updated 9 years ago
- You're a #pentester and you totally pwn that linux box, congrats! Now what? You can launch gimmecredz.sh which will try to extract all p…☆168Updated 5 years ago
- Code + documentation for the public GreyNoise API☆314Updated 4 years ago
- ☆237Updated 4 years ago
- PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems assoc…☆645Updated 4 years ago
- Detecting ATT&CK techniques & tactics for Linux☆258Updated 5 years ago