delvelabs / batea
AI-based, context-driven network device ranking
☆295Updated last year
Alternatives and similar repositories for batea:
Users that are interested in batea are comparing it to the libraries listed below
- Feed the tool a .nessus file and it will automatically get you MSF shell☆235Updated 2 years ago
- This repo contains logstash of various honeypots☆175Updated 4 years ago
- LinkedIn reconnaissance tool☆51Updated 3 years ago
- Proofs of Concept. Just fucking around.☆194Updated 2 years ago
- Red team & penetration testing tools to exploit the capabilities of Intel AMT☆257Updated 3 years ago
- ☆333Updated 2 years ago
- Detecting ATT&CK techniques & tactics for Linux☆258Updated 4 years ago
- Praetorian's public release of our Metasploit automation of MITRE ATT&CK™ TTPs☆719Updated 5 years ago
- Armory is a tool meant to take in a lot of external and discovery data from a lot of tools, add it to a database and correlate all of rel…☆418Updated 5 months ago
- A script that automates generation of OpenSSL reverse shells☆300Updated 4 years ago
- ☆281Updated 7 years ago
- gather gather gather☆569Updated 10 months ago
- A testing framework for mail security and filtering solutions.☆244Updated last year
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆245Updated 7 months ago
- Sheepl : Creating realistic user behaviour for supporting tradecraft development within lab environments☆395Updated 11 months ago
- a CLI for ephemeral penetration testing☆10Updated 5 years ago
- Attack Surface Management since before Attack Surface Management was a thing☆632Updated this week
- an asynchronous target enumeration tool☆243Updated 2 years ago
- Simulates common user behaviour on local and remote Windows hosts.☆283Updated 6 years ago
- Respounder detects presence of responder in the network.☆316Updated 5 years ago
- A lightweight, portable, and modular tool for Linux enumeration and privilege escalation.☆282Updated last week
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆597Updated 8 months ago
- nnposter's alternate fingerprint dataset for Nmap script http-default-accounts☆245Updated last month
- Password spraying using AWS Lambda for IP rotation☆583Updated 2 years ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,259Updated 3 weeks ago
- A collection of Ansible Playbooks that configure Kali to use Fish & install a number of tools☆161Updated 5 years ago
- A framework for stealthy domain reconnaissance☆298Updated 3 years ago
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security …☆1,002Updated 4 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆385Updated 6 years ago
- A powerful target reconnaissance framework powered by graph theory.☆421Updated 2 years ago