ecstatic-nobel / Aisle25
Detect leaks in security event logs.
☆19Updated 5 years ago
Related projects: ⓘ
- Pentest ToolKit☆27Updated 4 years ago
- Wireless Forensics Framework In Python☆19Updated 7 years ago
- ☆19Updated this week
- ☆21Updated this week
- recon-ng Maltego local transform pack☆37Updated 10 years ago
- My Dirty Scriptss ..!!!!! Pentest , OSINT , Python ,, Trainings☆52Updated 6 years ago
- Generic Signature Format for SIEM Systems☆14Updated 2 years ago
- A SIEM inspired by HECTOR, built on Django.☆27Updated 5 years ago
- ☆33Updated 6 years ago
- pentestscripts☆16Updated 5 years ago
- ☆11Updated 7 years ago
- urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Serve…☆34Updated 2 years ago
- ☆20Updated last year
- Repo of python/bash scripts for identifying IoC's in threat feed and other online tools☆26Updated 4 years ago
- Shodan.io Command Line Interface☆44Updated 3 years ago
- A curated list of awesome infosec resources.☆24Updated 9 years ago
- ☆28Updated 5 years ago
- Red Teaming with Kali Linux. OS Customization, additional tools, and automated updates☆12Updated 8 years ago
- Scripts I have written to perform various IT Security admin tasks. From validating findings to performing automated attacks☆18Updated 3 months ago
- Generates payloads using msfvenom and open multi handler listener☆11Updated 6 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆30Updated 2 years ago
- OSCP Focused Lab Pastable with some general Red Teaming Pastables.☆10Updated 4 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆14Updated 4 years ago
- A Python DNS crawler to find identical domain names under different TLDs.☆22Updated 5 years ago
- intrusion detection☆23Updated 7 years ago
- Proactive Computer Network Defense Strategy - OSINT Real Time Threat Stream - Social/DarkNet - Data Mining☆30Updated 12 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Updated 7 years ago
- A few quick recipes for those that do not have much time during the day☆21Updated 3 weeks ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 9 years ago
- Passphrase wordlist and hashcat rules for offline cracking of long, complex passwords☆12Updated 6 years ago