A Rogue Device Detection Script with Email Alerts Functionality for Windows Subsystem
☆100Mar 14, 2019Updated 6 years ago
Alternatives and similar repositories for AnchorWatch
Users that are interested in AnchorWatch are comparing it to the libraries listed below
Sorting:
- ☆14Sep 13, 2021Updated 4 years ago
- ☆17Oct 26, 2018Updated 7 years ago
- A Golang tool to whitelist ASN's based on organization name☆15Mar 7, 2022Updated 3 years ago
- An email client in CLI, designed specifically for spearphishing.☆13Jul 25, 2019Updated 6 years ago
- Powershell script to exfiltrate large files quickly and securely☆125May 4, 2022Updated 3 years ago
- Script(s) to assist with the setup of various tools on a Windows 11/10 VM, in preparation for Corelan Training☆30Feb 11, 2026Updated 3 weeks ago
- Proof of Concept for Netgear Routerlogin.com exploit☆17Feb 9, 2020Updated 6 years ago
- A Bash script which uses AWS CLI to create an image of an AWS EC2 volume☆29Jan 1, 2024Updated 2 years ago
- Tools for playing with Entrust IdentityGuard soft tokens, such as decrypting QR codes and deriving OTP secrets☆48Jan 13, 2023Updated 3 years ago
- A scan of all .gov.uk sites for the most common security headers or lack of☆15Oct 21, 2020Updated 5 years ago
- ☆37Apr 30, 2020Updated 5 years ago
- Merge & query nmap and nessus reports via SQL directly in your browser!☆20Jan 18, 2022Updated 4 years ago
- exploit for CVE-2018-4193☆69Feb 13, 2019Updated 7 years ago
- Python3 script to parse txt files containing Mimikatz output☆99Jun 19, 2020Updated 5 years ago
- PlasmaPup is designed to help central and departmental IT personnel understand their exposures in Active Directory by showing which accou…☆29Apr 10, 2024Updated last year
- Generate pentest reports based on github issues.☆16Dec 8, 2022Updated 3 years ago
- Sysmon config for both Windows and Linux Devices. Windows one is a bit dated☆55Jul 10, 2024Updated last year
- GreyNoise Query Language☆82May 7, 2019Updated 6 years ago
- Detect possible sysmon logging bypasses given a specific configuration☆111Dec 26, 2018Updated 7 years ago
- Scan for and exploit Consul agents☆39Jun 11, 2019Updated 6 years ago
- BlueKeep scanner supporting NLA☆167Jul 18, 2019Updated 6 years ago
- Automated, Collection, and Enrichment Platform☆324Nov 14, 2019Updated 6 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Nov 26, 2016Updated 9 years ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆51Feb 22, 2024Updated 2 years ago
- Hostile Dropboxes Management☆26Jan 8, 2020Updated 6 years ago
- Simple S3 Bucket Testing Software☆31Nov 4, 2021Updated 4 years ago
- ☆27Aug 18, 2023Updated 2 years ago
- Collection of PowerShell network security scripts for system administrators.☆156Aug 31, 2019Updated 6 years ago
- a kernel information leak on macOS<= 10.14.4☆10May 24, 2019Updated 6 years ago
- ☆11Mar 19, 2019Updated 6 years ago
- Fuzzer for finding Open Mail Relays☆14Oct 21, 2020Updated 5 years ago
- ☆98Mar 16, 2016Updated 9 years ago
- QuickSQL is a simple MSSQL query tool that allows you to connect to MSSQL databases and does not require administrative level rights to u…☆103Apr 17, 2020Updated 5 years ago
- ☆39Jul 29, 2021Updated 4 years ago
- Use smb2 protocol to detect remote computer os version, support win7/server2008-win10/server2019☆59Aug 25, 2021Updated 4 years ago
- Python3 Metasploit automation library☆24Dec 8, 2022Updated 3 years ago
- git clone all repositories and gists from a given GitHub username☆32Feb 27, 2026Updated last week
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 8 years ago
- ☆15May 23, 2019Updated 6 years ago