evilsocket / legba-cookbook
Legba recipes.
☆43Updated 5 months ago
Alternatives and similar repositories for legba-cookbook:
Users that are interested in legba-cookbook are comparing it to the libraries listed below
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated 8 months ago
- ☆35Updated last week
- CLI & library to search for default credentials among thousands of Products / Vendors☆39Updated this week
- It was developed to speed up the processes of SOC Analysts during analysis☆47Updated 10 months ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Password Transformation Tool (ptt) is a versatile utility designed for password cracking.☆27Updated last month
- ☆27Updated last year
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆36Updated 5 months ago
- ☆16Updated 6 months ago
- AutoPoC Generator HoneyPoC☆34Updated 6 months ago
- A script to automate the creation of cloud infrastructure for hash cracking.☆17Updated 5 years ago
- RedBlock is an Nginx module designed for offensive security operations and red teaming. This module empowers security professionals to ea…☆20Updated last year
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆50Updated 3 months ago
- Small python script wrapper for automating hashcat commands☆37Updated 4 years ago
- Monitor hashcat potfile for statistics☆8Updated last year
- passat - password auditing tool. Does statistical analyses on large sets of cracked passwords.☆24Updated 2 years ago
- PASSWORDS, NED! IN AN OPEN FIEEEELD!!☆18Updated last year
- Simple utility to manage multiple ssh☆14Updated 2 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 6 months ago
- A user enumeration tool for Slack.☆24Updated 7 months ago
- This is a simple Python script that connects to a MISP instance and retrieves attributes of specific types (such as IP addresses, URLs, a…☆16Updated last year
- Top hashpwn rules☆17Updated 2 months ago
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆26Updated last year
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆33Updated 4 years ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆51Updated 9 months ago
- ☆15Updated 4 months ago
- automated supported EAP method fingerprinting tool for WPA2-Enterprise wireless networks☆17Updated last year
- Monitor 802.11 probe requests from a capture file or network sniffing!☆29Updated 7 months ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Updated 2 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆34Updated last year