A Rogue Device Detection Script with Email Alerts Functionality for Windows Subsystem
☆100Mar 14, 2019Updated 7 years ago
Alternatives and similar repositories for AnchorWatch
Users that are interested in AnchorWatch are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An email client in CLI, designed specifically for spearphishing.☆13Jul 25, 2019Updated 6 years ago
- ☆17Oct 26, 2018Updated 7 years ago
- ☆14Sep 13, 2021Updated 4 years ago
- Powershell script to exfiltrate large files quickly and securely☆125May 4, 2022Updated 4 years ago
- Sysmon config for both Windows and Linux Devices. Windows one is a bit dated☆55Jul 10, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A Golang tool to whitelist ASN's based on organization name☆15Mar 7, 2022Updated 4 years ago
- A scan of all .gov.uk sites for the most common security headers or lack of☆15Oct 21, 2020Updated 5 years ago
- A full-fledged msfrpc library for Metasploit framework.☆13Aug 5, 2017Updated 8 years ago
- exploit for CVE-2018-4193☆69Feb 13, 2019Updated 7 years ago
- ☆40Jul 29, 2021Updated 4 years ago
- ☆37Apr 30, 2020Updated 6 years ago
- Random code snippets☆12Oct 27, 2023Updated 2 years ago
- Windows login backdoor diagnostic tool☆11Apr 2, 2017Updated 9 years ago
- Fuzzer for finding Open Mail Relays☆14Oct 21, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- PowerShell wrapper for nmap, allows easy scanning of many hosts and subnets☆15Apr 1, 2018Updated 8 years ago
- Merge & query nmap and nessus reports via SQL directly in your browser!☆20Jan 18, 2022Updated 4 years ago
- A Bash script which uses AWS CLI to create an image of an AWS EC2 volume☆29Jan 1, 2024Updated 2 years ago
- PoC for CVE-2019-10149, this vulnerability could be xploited betwen 4-87 to 4.91 version of Exim server.☆14Jun 18, 2019Updated 6 years ago
- TXT and PDF documents from the NSA☆15Mar 24, 2015Updated 11 years ago
- HackSys Extreme Vulnerable Driver - Various Windows 7 x86 Kernel Exploits☆21Jan 13, 2018Updated 8 years ago
- Collection of PowerShell network security scripts for system administrators.☆156Aug 31, 2019Updated 6 years ago
- collector☆64Apr 30, 2026Updated last week
- Python3 script to parse txt files containing Mimikatz output☆99Jun 19, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Jul 26, 2019Updated 6 years ago
- Enterprise WPA Wireless Tool Suite☆87Sep 13, 2022Updated 3 years ago
- Detect possible sysmon logging bypasses given a specific configuration☆111Dec 26, 2018Updated 7 years ago
- Password Hunter in Active Directory☆199Jan 6, 2023Updated 3 years ago
- Script(s) to assist with the setup of various tools on a Windows 11/10 VM, in preparation for Corelan Training☆39May 2, 2026Updated last week
- Proof of Concept for Netgear Routerlogin.com exploit☆17Feb 9, 2020Updated 6 years ago
- The Phishing Intelligence Engine - An Active Defense PowerShell Framework for Phishing Defense with Office 365☆180Apr 13, 2020Updated 6 years ago
- Automated, Collection, and Enrichment Platform☆326Nov 14, 2019Updated 6 years ago
- QuickSQL is a simple MSSQL query tool that allows you to connect to MSSQL databases and does not require administrative level rights to u…☆105Apr 17, 2020Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 8 years ago
- Identify technologies used on websites.☆296Jan 14, 2024Updated 2 years ago
- A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting☆825May 1, 2026Updated last week
- This is a backup/test setup for the /r/ActiveDirectory reddit wiki and resource posts.☆19Mar 5, 2026Updated 2 months ago
- A certificate generator/manager for the WiFi Pineapple NANO and TETRA☆12Jul 18, 2020Updated 5 years ago
- Facebook Basic Pro Scame Page☆17Nov 7, 2017Updated 8 years ago
- GreyNoise Query Language☆82May 7, 2019Updated 7 years ago