evilsocket / legba-cookbook
Legba recipes.
☆47Updated 6 months ago
Alternatives and similar repositories for legba-cookbook:
Users that are interested in legba-cookbook are comparing it to the libraries listed below
- ☆27Updated last year
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆52Updated 10 months ago
- A script to automate keystrokes through a graphical desktop program.☆33Updated last month
- passat - password auditing tool. Does statistical analyses on large sets of cracked passwords.☆24Updated 3 years ago
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆38Updated 6 months ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 7 months ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆17Updated 2 years ago
- It was developed to speed up the processes of SOC Analysts during analysis☆47Updated 11 months ago
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆23Updated 2 months ago
- IVRE's fork of the famous TCP port scanner. See below for details.☆41Updated last month
- Top hashpwn rules☆18Updated 3 months ago
- CLI and API server for https://github.com/dreadnode/robopages☆29Updated 3 weeks ago
- Enumeration & fingerprint tool☆24Updated last year
- fully async implementation of Dirkjan's ROADTools☆31Updated last year
- ☆37Updated 10 months ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆22Updated 7 months ago
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆26Updated last year
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆40Updated last year
- A swiss army knife for pentesting networks☆24Updated 2 years ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated 10 months ago
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆24Updated 7 months ago
- AutoPoC Generator HoneyPoC☆35Updated 7 months ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- A blazing fast, high performance implementation of AutoRecon in Rust. A multi-threaded network reconnaissance tool which performs automa…☆40Updated 2 months ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆32Updated this week
- A multi-threaded password sprayer based on Medusa, built for distributed spraying.☆37Updated 3 years ago
- An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.☆14Updated 9 months ago
- A user enumeration tool for Slack.☆24Updated 8 months ago