hasameli / foghornView external linksLinks
The foghorn project is a DNS proxy intended to reduce user exposure to phishing and other malicious items that can be interdicted by DNS greylisting
☆142Feb 8, 2017Updated 9 years ago
Alternatives and similar repositories for foghorn
Users that are interested in foghorn are comparing it to the libraries listed below
Sorting:
- CimSweep is a suite of CIM/WMI-based tools that enable the ability to perform incident response and hunting operations remotely across al…☆657Aug 19, 2019Updated 6 years ago
- A reference Device Guard code integrity policy consisting of FilePublisher deny rules for published Device Guard configuration bypasses☆114May 27, 2017Updated 8 years ago
- VPS infrastructure found in HT dumps☆26Jul 10, 2015Updated 10 years ago
- Wifi-Biter is a dictionary generator used to generate dictionaries/wordlist for Wireless Router Passwords.☆14Nov 12, 2018Updated 7 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆828Nov 3, 2017Updated 8 years ago
- Nameserver DNS poisoning attacks made easy☆525Feb 26, 2017Updated 8 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Jun 14, 2017Updated 8 years ago
- first commit☆20Sep 12, 2025Updated 5 months ago
- Auto Domain Admin and Network Exploitation.☆299Dec 21, 2017Updated 8 years ago
- Ansible scripts to build an attack box☆24Sep 24, 2018Updated 7 years ago
- Incident Response Forensic Framework☆611Nov 20, 2019Updated 6 years ago
- powerful auto-backdooring utility☆748Dec 20, 2017Updated 8 years ago
- CANAPE Network Testing Tool☆33Sep 25, 2018Updated 7 years ago
- Calculate the xor distance between two buffers as a new buffer and compare computed distances with eachother☆38Dec 14, 2020Updated 5 years ago
- ☆24Apr 17, 2021Updated 4 years ago
- A bunch of scripts I use to work with urlscan.io☆35Oct 25, 2019Updated 6 years ago
- x86-64 Windows shellcode that recreates the Jurassic Park hacking scene (Ah, ah, ah... you didn't' say the magic word!)☆85Nov 7, 2020Updated 5 years ago
- ☆242Jun 15, 2024Updated last year
- A YARA-integrated process denial framework for Windows☆397Feb 15, 2020Updated 6 years ago
- ☆108Mar 21, 2017Updated 8 years ago
- Modern Honey Network deployment with ansible☆12Jun 4, 2022Updated 3 years ago
- Detect silent (unwanted) changes to files on your system☆162May 4, 2020Updated 5 years ago
- Harbinger Threat Intelligence☆83Dec 8, 2015Updated 10 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆315Mar 24, 2018Updated 7 years ago
- Detects code differentials between executables in disk and the corresponding processes/modules in memory☆115Jun 19, 2020Updated 5 years ago
- Query and report user logons relations from MS Windows Security Events☆243Aug 9, 2018Updated 7 years ago
- Test a network's egress controls with various levels of success and failure.☆104May 1, 2022Updated 3 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆383Aug 17, 2018Updated 7 years ago
- This is a gem that provides the ability to create a workspace, import scan data from nexpose, and perform a webscan, a web audit, and per…☆10Dec 13, 2017Updated 8 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Jul 16, 2020Updated 5 years ago
- Server for receiving autorun data from the clients☆13Sep 26, 2017Updated 8 years ago
- UDP to TCP tunnel for sending datagrams through weak network☆12Jan 31, 2013Updated 13 years ago
- Automated Reverse TCP tunneling using a digitalocean instance and aploium's shootback repo (https://github.com/aploium/shootback)☆13Oct 30, 2018Updated 7 years ago
- golang for http socks5 proxy☆20Jan 16, 2014Updated 12 years ago
- virt plugin for netdata to monitor libvirt-managed VMs☆11Mar 25, 2022Updated 3 years ago
- ☆13Aug 11, 2018Updated 7 years ago
- A tool for extracting, modifying, and crafting ASDM binary packages (CVE-2022-20829)☆13Aug 15, 2022Updated 3 years ago
- ☆91Jul 31, 2019Updated 6 years ago
- A Node.js module to lookup URLs for suspected phishing/malware sites using Google's Safe Browsing Lookup API☆18Jan 26, 2017Updated 9 years ago