ghousali17 / IDS-C
A simple intrusion detection system that detects anomalous IP payloads, vertical and horizontal port scanning attacks in the selected network interface.
☆10Updated 7 years ago
Alternatives and similar repositories for IDS-C:
Users that are interested in IDS-C are comparing it to the libraries listed below
- Automated Payload Test Controller☆9Updated 7 years ago
- An AV evasion technique using multibyte xor encoding of shellcode☆8Updated 8 years ago
- Do the unexpected with AD GPO processing☆9Updated 5 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Updated 7 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- Frontend to import Nmap Scan in ES, and frontend to make search☆10Updated 10 years ago
- Linux and Windows Hardening Points☆12Updated 7 years ago
- Retrieve the IIS Application Pool Credentials. Relies on the WebAdministration PowerShell Module.☆14Updated 7 years ago
- Automated tool for setting up KingPhisher☆9Updated 4 years ago
- Ansible scripts to build an attack box☆22Updated 6 years ago
- Apfell implant written in C#.☆8Updated 4 years ago
- SSDP Service Discovery☆17Updated 6 years ago
- Apply a filter to the events being reported by windows event logging☆15Updated 4 years ago
- parsers to make life easier☆13Updated 4 years ago
- Identify common attack paths to get Domain Administrator☆22Updated 5 years ago
- ☆16Updated 6 years ago
- Exactly what it sounds like, which is something rad☆22Updated 2 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- Python crawler for remote Windows shares☆12Updated 9 years ago
- Small utility script to notify via Slack about Hashcat's progress during a password cracking session☆10Updated 6 years ago
- A Tool for cross-platform System Enumeration☆12Updated 8 years ago
- An information gathering tool to collect git emails in version control host services☆11Updated 5 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆12Updated 8 years ago
- ☆14Updated 3 years ago
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆33Updated 5 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Updated 10 years ago
- ☆10Updated 7 years ago
- Slides from my AD Privesc talk at WAHCKon 2017☆16Updated 7 years ago
- ☆15Updated 5 years ago
- Spin up a reverse proxy quickly on Heroku☆14Updated 4 years ago