A checklist of items to check, especially when inheriting a foreign network.
☆29Mar 6, 2019Updated 6 years ago
Alternatives and similar repositories for NetworkHealthChecklist
Users that are interested in NetworkHealthChecklist are comparing it to the libraries listed below
Sorting:
- Tool to automate corporate network segmentation test☆21Aug 6, 2020Updated 5 years ago
- Osquery Packs we use for customer security hardening☆12Jun 30, 2025Updated 8 months ago
- Phactive - Monitoring an Environment with Nmap red teaming☆12May 11, 2019Updated 6 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- Manage and maintain Defender XDR custom collection configuration☆33Nov 19, 2025Updated 3 months ago
- Learn basic crypto in 2 hours☆16Nov 25, 2021Updated 4 years ago
- Identify common attack paths to get Domain Administrator☆21Aug 20, 2019Updated 6 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Mar 10, 2023Updated 2 years ago
- Packaging audit toolkit using vulners.com vulnerability database☆20Apr 9, 2018Updated 7 years ago
- Cross platform (i.e., Windows, Linux, Mac) assessment script. The script helps assess workstations for vulnerabilities and abnormalities.☆19Aug 14, 2015Updated 10 years ago
- API Test automation Framework with Speclow☆10Dec 7, 2022Updated 3 years ago
- Ansible Network Config Manager Role☆23Jul 23, 2019Updated 6 years ago
- Some metasploit scripts to help to control busybox based embedded devices☆30Aug 13, 2015Updated 10 years ago
- ☆22May 20, 2016Updated 9 years ago
- Instant access to you bug bounty submission dashboard on various platforms + publicly disclosed reports + #bugbountytip☆26May 26, 2020Updated 5 years ago
- An automated firmware analysis tool based on Firmadyne (https://github.com/firmadyne/firmadyne)☆24Jul 8, 2017Updated 8 years ago
- ☆26Apr 5, 2020Updated 5 years ago
- ☆32Jun 3, 2019Updated 6 years ago
- A collection of scripts made duing my personal research☆29Sep 27, 2018Updated 7 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆23Apr 20, 2015Updated 10 years ago
- show which process did what DNS queries☆36Jan 25, 2018Updated 8 years ago
- Qui puoi trovare i comandi aggiornati per l'uso con Debian 11. Se hai acquistato il libro prima del 2022 probabilmente sei nel posto gius…☆14Jan 11, 2023Updated 3 years ago
- D2R MapHack☆11Jun 10, 2022Updated 3 years ago
- Cheatsheets on security vulnerabilities and exploits.☆34Jan 20, 2020Updated 6 years ago
- time-based user enum via Basic Auth in Azure against Autodiscover☆34Oct 3, 2024Updated last year
- Command-line utility to control Tor.☆90Nov 28, 2023Updated 2 years ago
- Standalone Windows tool to automatically retrieve Sysinternals' AD Explorer search output from the ListView control and save/copy to clip…☆38Apr 12, 2016Updated 9 years ago
- My RubyConf 2021 Workshop Materials☆10Nov 5, 2021Updated 4 years ago
- A simple intrusion detection system that detects anomalous IP payloads, vertical and horizontal port scanning attacks in the selected net…☆10Apr 16, 2018Updated 7 years ago
- Open source WEC Simulator☆10Nov 4, 2016Updated 9 years ago
- Simple Microsoft MVVM Toolkit Sample☆10Oct 21, 2024Updated last year
- Collection of GIS Resources☆13Jan 13, 2015Updated 11 years ago
- A malware sandoxed with gdb☆15Jun 27, 2016Updated 9 years ago
- Game Boy emulator written in Rust☆13Apr 30, 2022Updated 3 years ago
- TeamViewer QuickSupport Integration for .net applications☆11Jan 20, 2022Updated 4 years ago
- Python script to give you subsets of the nmap "top-ports". For example, I want the 10th to 100th most common TCP ports. Spits out a comma…☆18Mar 8, 2020Updated 5 years ago
- Set of tools to interface with Kodi☆13Jan 4, 2020Updated 6 years ago
- Install and configure mssql on your system.☆10Dec 22, 2023Updated 2 years ago
- Collection of MVVM best practices. The way I build apps with MVVMLight and other bits and pieces.☆10Feb 12, 2021Updated 5 years ago