droberson / greylostLinks
DNS logging, detection, ...
☆15Updated 3 years ago
Alternatives and similar repositories for greylost
Users that are interested in greylost are comparing it to the libraries listed below
Sorting:
- A collection of tools adversaries commonly use in an attack.☆14Updated 6 months ago
- Kibana app for RedELK☆17Updated 2 years ago
- Do the unexpected with AD GPO processing☆9Updated 6 years ago
- Experimenting with destructive file attacks in Go☆18Updated 6 years ago
- Rosie the Pivoter☆17Updated 6 years ago
- Small utility script to notify via Slack about Hashcat's progress during a password cracking session☆10Updated 6 years ago
- parsers to make life easier☆13Updated 4 years ago
- autopwn rdp servers☆8Updated 6 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆11Updated 4 years ago
- A PowerShell script to prevent Sysmon from writing its events☆15Updated 5 years ago
- Standardizing Security Titles☆13Updated 2 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Updated 4 years ago
- Free Email Providers☆10Updated last year
- Network Finger Printer☆16Updated 7 years ago
- Miscellaneous exploit scripts☆17Updated 3 years ago
- Assists in mass exportation of Nessus scans☆21Updated 7 years ago
- LetMeOutOfYour.net Resources☆20Updated 4 years ago
- just manipulatin these here tokens yes sir nothing weird☆22Updated 3 years ago
- module for certexfil☆15Updated 2 years ago
- Automated Payload Test Controller☆10Updated 7 years ago
- A private botnet using multiple cloud environments for pentesters and red teamers. - Built by the community during a hackathon at the WWH…☆9Updated 6 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆9Updated 8 years ago
- Automated tool for setting up KingPhisher☆9Updated 4 years ago
- ☆17Updated 6 years ago
- Hostile Dropboxes Management☆26Updated 5 years ago
- A Canary which fires when uninstalled☆34Updated 4 years ago
- ☆12Updated 4 years ago
- Identify common attack paths to get Domain Administrator☆22Updated 5 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- Miscellaneous for various things☆21Updated 7 months ago