ekiojp / circoLinks
Cisco Implant Raspberry Controlled Operations
☆51Updated 2 years ago
Alternatives and similar repositories for circo
Users that are interested in circo are comparing it to the libraries listed below
Sorting:
- Packet communication investigator☆91Updated 3 years ago
- A bunch of scripts I use to work with urlscan.io☆35Updated 6 years ago
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆65Updated 6 years ago
- Automatically exported from code.google.com/p/nipper-ng☆73Updated 3 years ago
- ☆54Updated 5 years ago
- Prepare, Hunt, and Respond - Conceptual model against cyber attacks by JYVSECTEC☆61Updated 4 years ago
- rules to identify files containing juicy information like usernames, passwords etc☆129Updated 8 years ago
- No-Script Automation Tool☆56Updated 7 years ago
- This PowerShell script will determine if your connection to external servers over HTTPS is being decrypted by an intercepting proxy such …☆68Updated 7 years ago
- A cloud-backed password cracking and assessment tool - Sponsored by Open Security☆71Updated 3 years ago
- Extract indicators of compromise from text, including "escaped" ones.☆162Updated 5 years ago
- Scout - a Contactless Active Reconnaissance Tool☆56Updated 3 years ago
- Creates dictionaries based on Wikipedia titles☆63Updated 6 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆56Updated last year
- GreyNoise Query Language☆82Updated 6 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Updated 6 years ago
- Simulating Adversary Operations☆97Updated 7 years ago
- Linux Local Privesc Helper and Agent☆167Updated 6 years ago
- This repo is dedicated to all my tricks, tweaks and modules for testing and hunting threats. This repo contains multiple directories whic…☆57Updated 8 years ago
- Detects Cisco DTP modes for VLAN Hopping (passive detection)☆77Updated 11 years ago
- NebulousAD automated credential auditing tool.☆154Updated 5 years ago
- This repository contains all the config files and scripts used for our Open Source Endpoint monitoring project.☆35Updated 6 years ago
- An extensible honeypot framework☆96Updated 3 years ago
- Detect and log CVE-2019-19781 scan and exploitation attempts.☆118Updated 6 years ago
- Aktaion is a machine learning open source & active defense (orchestration) prototype. The tool focuses on the detection of exploits based…☆51Updated 2 years ago
- Linux bash tool for Enumeration & Privilege Escalation☆57Updated 6 years ago
- Mitre Att&ck Technique Emulation☆82Updated 6 years ago
- The opposite of Ruler, provides blue teams with the ability to detect Ruler usage against Exchange.☆96Updated 8 years ago
- Bluewall is a firewall framework designed for offensive and defensive cyber professionals.☆106Updated 6 years ago
- PSAttck is a light-weight framework for the MITRE ATT&CK Framework.☆38Updated 4 years ago