evallen / ntpescapeLinks
NTP Exfiltration Tool
☆142Updated last year
Alternatives and similar repositories for ntpescape
Users that are interested in ntpescape are comparing it to the libraries listed below
Sorting:
- Cisco IOS Security Inspector☆33Updated 3 months ago
- Nuclei templates for honeypots detection.☆196Updated last year
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆197Updated 2 weeks ago
- ☆57Updated 2 years ago
- Ping-based Information Lookup and Outbound Transfer☆79Updated last year
- RADAR (Rapid Assessment of DNS And Reconnaissance) is an advanced DNS reconnaissance tool designed to identify technologies and services …☆98Updated 3 months ago
- Signature based honeypot detector tool written in Golang☆98Updated 3 months ago
- DNSleuth sniffs DNS packets, i.e, allowing you to spy on the DNS queries your machine is making☆103Updated last year
- A Slack bot phishing framework for Red Teaming exercises☆167Updated last year
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆147Updated last year
- Secret Scanner for Slack, Jira, Confluence, Asana, Wrike, Linear, Zendesk, GitHub, and GitLab☆63Updated last month
- A fast and comprehensive tool for organizational network scanning☆133Updated last year
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆126Updated last year
- Keylogging server and client that uses DNS tunneling/exfiltration to transmit keystrokes through firewalls.☆274Updated last year
- Dredging up secrets from the depths of the file system☆128Updated 8 months ago
- exfiltration/infiltration toolkit☆45Updated 8 months ago
- Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environment…☆141Updated last year
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆104Updated last year
- A tool to remotely detect unusual sessions opened on windows machines using RPC☆115Updated last month
- 🎒 An up-to-date collection of precompiled binaries and hacking scripts.☆41Updated last week
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆120Updated last year
- Analyze pcaps with Zeek and a Grafana Dashboard☆178Updated last year
- Check IP addresses against known cloud provider IP address ranges☆45Updated last year
- Fast Path Traversal exploitation tool☆21Updated last year
- [GITLAB MIRROR] Ludus is a system to build easy to use cyber environments for testing and development.☆81Updated this week
- This tool is a command line utility that allows you to convert any binary file into a QRcode movie. The data can then be reassembled visu…☆266Updated 2 years ago
- WolfPack combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale.☆148Updated last month
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆132Updated 11 months ago
- Enhance your malware detection with WAF + YARA (WAFARAY)☆109Updated 2 years ago
- A delicious, but malicious SSL-VPN server 🌮☆236Updated last month