ecstatic-nobel / Aisle25
Detect leaks in security event logs.
☆20Updated 6 years ago
Alternatives and similar repositories for Aisle25:
Users that are interested in Aisle25 are comparing it to the libraries listed below
- Pentest ToolKit☆28Updated 5 years ago
- ☆33Updated 3 months ago
- DPE - Default Password Enumeration☆34Updated 11 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 5 months ago
- ☆14Updated 6 years ago
- Red Teaming with Kali Linux. OS Customization, additional tools, and automated updates☆12Updated 8 years ago
- ☆11Updated 8 years ago
- Simple bash script to enumerate Linux machines☆13Updated 6 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Updated 3 years ago
- recon-ng Maltego local transform pack☆40Updated 11 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Updated 4 years ago
- CERT Australia Cyber Threat Intelligence (CTI) Toolkit☆12Updated 7 years ago
- Passive recon / OSINT automation script☆39Updated 6 years ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆23Updated 3 years ago
- Following repository contains source codes used in my two Books.☆11Updated 9 years ago
- Small and highly portable detection tests.☆13Updated 7 years ago
- urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Serve…☆36Updated 3 years ago
- Shodan Port Scanner☆42Updated 4 years ago
- A single repository for any security tools, scripts, documentation, etc. that I add☆12Updated 8 years ago
- Advanced web server fingerprinting☆22Updated 7 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Updated 8 years ago
- HoneyDB Python Module☆13Updated last year
- Scripts I have written to perform various IT Security admin tasks. From validating findings to performing automated attacks☆19Updated last month
- ☆30Updated 6 years ago
- pentestscripts☆16Updated 5 years ago
- Proactive Computer Network Defense Strategy - OSINT Real Time Threat Stream - Social/DarkNet - Data Mining☆31Updated 12 years ago
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆14Updated 5 years ago
- intrusion detection☆23Updated 7 years ago