g-solaria / Xonitor
A monitoring program with sentiment analysis and prioritization.
☆13Updated 6 years ago
Alternatives and similar repositories for Xonitor:
Users that are interested in Xonitor are comparing it to the libraries listed below
- Audible Electromagnetic Interference Detector - Model ET-1☆14Updated 4 years ago
- ☆13Updated 7 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 5 years ago
- This tool for crack hash password BLAKE-224 BLAKE-256 BLAKE-512 BLAKE-384 with bruteforce method☆18Updated 6 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- A Python based backdoor that uses Steganography and a Cloud Image Service as a command and control server.☆26Updated 8 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- thedumpster is a tool which does passive recon using google and its dorks against a particular domain.☆11Updated 9 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- Automated PowerShell installer for *Nix with multi Distro support.☆20Updated 6 years ago
- Scans for the MS17-010 vulnerability and drops the alert into slack.☆15Updated 7 years ago
- print() to Slack!☆12Updated 7 years ago
- Spark MLib Training Models for Network Security☆16Updated 6 years ago
- Honeypot for router backdoor (TCP 32764)☆18Updated 11 years ago
- Browser agnostic extension that enables pasting into password fields...☆15Updated 5 years ago
- Set of PoC for exploits for QRadar SIEM☆15Updated 7 years ago
- like hidden-tear with libsodium☆20Updated 9 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆36Updated 3 years ago
- Gather information on Wiki contributions from IP ranges☆24Updated 7 years ago
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Updated 7 years ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆25Updated 7 years ago
- A semi fast tool to bruteforce values of LDAP injections over HTTP.☆13Updated 11 years ago
- This is a python version of samesame repo to generate homograph strings☆23Updated 6 years ago
- This repository is a curated list of pro bono incident response entities.☆20Updated last year
- Python Remote Administration Tool☆13Updated 8 years ago
- Network white noise collector☆18Updated 8 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 6 years ago
- Monitor Certificate Transparency Logs For Phishing Domains☆25Updated 6 years ago
- Hasher is designed to be a tool that allows you to quickly hash plaintext strings, or compare hashed values with a plaintext locally. Not…☆50Updated 3 years ago
- Yet-Another-BlueTeam-Repo-YABTR. A Repo for a collection of FREE Blue team tools for both windows and Linux.. Not vendor buy to defend pr…☆2Updated 5 years ago