g-solaria / Xonitor
A monitoring program with sentiment analysis and prioritization.
☆13Updated 6 years ago
Alternatives and similar repositories for Xonitor:
Users that are interested in Xonitor are comparing it to the libraries listed below
- ☆13Updated 7 years ago
- Audible Electromagnetic Interference Detector - Model ET-1☆14Updated 5 years ago
- This tool for crack hash password BLAKE-224 BLAKE-256 BLAKE-512 BLAKE-384 with bruteforce method☆18Updated 7 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Chrome extension to extract data from websites surfed inside of chrome☆18Updated 10 years ago
- Python Remote Administration Tool☆13Updated 8 years ago
- Browser agnostic extension that enables pasting into password fields...☆15Updated 5 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- A SHA-3 finalist hash (BLAKE) reversal using rainbow tables.☆15Updated 7 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Updated 5 years ago
- NAT Pinning test suite tool for penetration testers.☆31Updated 11 years ago
- Set of PoC for exploits for QRadar SIEM☆15Updated 7 years ago
- A static website template for security pages.☆50Updated 8 months ago
- Searches for interesting cached DNS entries.☆55Updated 10 years ago
- Network based steganography based control channels and chat.☆8Updated 8 years ago
- Bash script to automate the installation and buildouts of OpenVPN servers and clients.☆6Updated 12 years ago
- thedumpster is a tool which does passive recon using google and its dorks against a particular domain.☆11Updated 10 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Updated 4 years ago
- The SSH Multiplex Backdoor Tool☆64Updated 5 years ago
- Shell script to automate running the Nmap smb-security-mode.nse or RunFinger.py by lgandx and parse results into counts and lists of host…☆14Updated 7 years ago
- Simple, hand-picked list of fuzz strings☆32Updated 8 years ago
- Security Product Taskbar Icons (to identify from screenshots)☆56Updated 5 years ago
- Passive Spider uses search engines to find interesting information about a target domain.☆17Updated 11 years ago
- List (or plunder) private repos/gists to which a token has access, including those of other users☆11Updated 3 years ago
- A Python based backdoor that uses Steganography and a Cloud Image Service as a command and control server.☆26Updated 8 years ago
- Get detailed information about a Twitter user activity☆17Updated 7 years ago
- Testing page for checking the privileges that a browser gives to the file:// origin☆10Updated 9 years ago
- Learning about disassembling☆20Updated 5 years ago