dichotomy / scorebotLinks
Scoring Engine for CTF competitions
☆48Updated 2 years ago
Alternatives and similar repositories for scorebot
Users that are interested in scorebot are comparing it to the libraries listed below
Sorting:
- Comprehensive Pivoting Framework☆20Updated 9 years ago
- A tool to catch spoofed NBNS responses.☆50Updated 7 years ago
- Pull author and committer names and emails from Travis-CI☆11Updated 5 years ago
- Talk given at DerbyCon and RuxCon 2016☆22Updated 9 years ago
- malicious file maker/sender to create and send malicious attachments to test your email filter/alerting☆69Updated 7 years ago
- A simplified SMB Email Client Attack script used for pentests.☆30Updated 6 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆55Updated 10 months ago
- The documents☆56Updated 7 years ago
- ☆61Updated 7 years ago
- Automated enumeration☆30Updated 4 years ago
- Clustering NMAP XML results to help make sense of large scan results.☆33Updated 2 years ago
- Yara intergrated into BurpSuite☆48Updated 9 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 7 years ago
- The initial conversation slides and menu of scenarios☆38Updated 4 years ago
- Modular tool to test exfiltration techniques.☆37Updated 8 years ago
- Simple DDE object detector☆56Updated 7 years ago
- OpenCV based IDN option generator PoC☆39Updated 8 years ago
- Git Web Hook Tunnel for C2☆28Updated last year
- Repository for Endpoint Security Testing☆35Updated 7 years ago
- Duo MFA auditing tool to test users' likelihood of approving unexpected push notifications☆13Updated 7 years ago
- Speeds up the extraction of password hashes from ntds.dit files. For use with the ntdsxtract project or the dshash script☆27Updated last year
- ☆113Updated 8 years ago
- Tool orchestrator. Specify targets and run sets of tools against them.☆19Updated 9 years ago
- A tool for importing vulnerability scanner data and then allowing you to manipulate the risks, affected hosts, and create risk ordered ou…☆80Updated last year
- Development guide for Volatility Plugins☆23Updated 8 years ago
- Material from our CANAPE workshop☆32Updated 6 years ago
- Anti-Honeypot Demo (obsolete)☆18Updated 8 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 9 years ago
- ☆50Updated 9 years ago
- This PowerShell script will determine if your connection to external servers over HTTPS is being decrypted by an intercepting proxy such …☆67Updated 7 years ago