evallen / ntpescapeLinks
NTP Exfiltration Tool
☆146Updated last year
Alternatives and similar repositories for ntpescape
Users that are interested in ntpescape are comparing it to the libraries listed below
Sorting:
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆197Updated last week
- Cisco IOS Security Inspector☆37Updated last week
- A tool to remotely detect unusual sessions opened on windows machines using RPC☆117Updated 4 months ago
- Secret Scanner for Slack, Jira, Confluence, Asana, Wrike, Linear, Zendesk, GitHub, and GitLab☆68Updated last week
- Nuclei templates for honeypots detection.☆195Updated last year
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆105Updated 2 years ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆121Updated last year
- Signature based honeypot detector tool written in Golang☆104Updated 7 months ago
- Fast Path Traversal exploitation tool☆21Updated last year
- ☆55Updated 9 months ago
- [GITLAB MIRROR] Ludus is a system to build easy to use cyber environments for testing and development.☆110Updated last week
- Ping-based Information Lookup and Outbound Transfer☆79Updated last year
- All kinds of tiny shells☆58Updated 2 years ago
- DNSleuth sniffs DNS packets, i.e, allowing you to spy on the DNS queries your machine is making☆101Updated 2 years ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146Updated last year
- A web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly.☆145Updated this week
- Dredging up secrets from the depths of the file system☆130Updated 11 months ago
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆135Updated last year
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆126Updated last year
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Updated last year
- Generate graphs and charts based on password cracking result☆162Updated 2 years ago
- linikatz is a tool to attack AD on UNIX☆147Updated 2 years ago
- RADAR (Rapid Assessment of DNS And Reconnaissance) is an advanced DNS reconnaissance tool designed to identify technologies and services …☆102Updated 6 months ago
- Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environment…☆141Updated last year
- exfiltration/infiltration toolkit☆48Updated 11 months ago
- Analyze pcaps with Zeek and a Grafana Dashboard☆186Updated last year
- MSSprinkler is a password spraying utility for organizations to test their Microsoft Online accounts from an external perspective. It emp…☆76Updated last month
- C2 Automation using Linode☆85Updated 3 years ago
- MailSecOps is an email and mail gateway security testing tool. With this script, you can perform mail spoofing, relay tests and security …☆56Updated 11 months ago
- A Slack bot phishing framework for Red Teaming exercises☆165Updated last year