dinosec / dnssecchef
DNSSECChef: DNS/DNSSEC Interception Proxy
☆36Updated 5 years ago
Related projects: ⓘ
- Tool to automate the whole process of environment in android audits☆14Updated 5 years ago
- ☆20Updated last year
- Lab Environment for learning client-side attacks such as CSRF, Clickjacking, XSS, and CORS abuse.☆20Updated last year
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆71Updated 4 years ago
- Python-based CLI Password Analyser (Reporting Tool)☆32Updated 3 years ago
- Popular Ransomware file extensions☆26Updated 4 months ago
- ☆21Updated 7 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆35Updated 5 years ago
- Report and finding templates used by the Serpico reporting tool☆15Updated 5 years ago
- scripts to setup environments for red/blue teams.☆16Updated 9 months ago
- c0r0n4con talk 12 april 2020☆23Updated 4 years ago
- Program to perform vulnerability analysis and automatically generate a report☆56Updated 2 years ago
- ☆12Updated this week
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆23Updated 2 years ago
- Scanner that runs enumeration scripts while you do other things, made for the OSCP exam☆26Updated 4 years ago
- ☆28Updated 5 years ago
- ☆13Updated this week
- Penetration Testing/Security Cheatsheets☆55Updated 8 years ago
- Where I'll be posting my scripts, guides, cheatsheets, and notes for for my OSCP journey.☆31Updated 6 years ago
- Rogue Access Point Detector☆35Updated 2 weeks ago
- Veil 3.1.X (Check version info in Veil at runtime)☆14Updated 5 years ago
- Web Filter External Enumeration Tool (WebFEET)☆75Updated 10 years ago
- The "Virtual Whale" OSINT CTF at BSides DFW 2019!☆22Updated 4 years ago
- A tool to parse Firefox and Chrome HSTS databases into forensic artifacts!☆25Updated 2 months ago
- PoC for extracting office files into PDF file metadata☆10Updated 5 years ago
- Offensive Security Certified Profesional (OSCP) course scripts, some have been generalized☆47Updated 6 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Updated 7 years ago
- A toolkit to attack Office365☆16Updated 5 years ago
- Snort_rules detection bad actors.☆28Updated last month
- ☆36Updated this week