jacauc / WinLoginAudit
Send realtime Windows Login Audit trail to Telegram messenger
☆35Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for WinLoginAudit
- mikrot8over: Fast exploitation tool for Mikrotik RouterOS up to 6.38.4☆110Updated 4 years ago
- Tor bridge running obfs4 obfuscation protocol in Alpine 🐳☆8Updated 9 months ago
- Domain, IPv4 & v6 address & network information gathering, web server analysis, DNS- & BGP- related information☆13Updated 11 months ago
- A defense tool - detect web shells in local directories via md5sum☆32Updated 5 years ago
- Free and open cyber-security auditing tool with collective intelligence☆21Updated 5 years ago
- Decentralized DNS fuzzer to mitigate ISP Snooping☆12Updated 7 years ago
- Yet Another MOnitoring Tool☆60Updated 6 years ago
- Mikrotik RouterOS (6.x < 6.38.5) exploit kit. Reverse engineered from the "Vault 7" WikiLeaks publication.☆74Updated 6 years ago
- Some Powershell scripts developed during my security consulting work. Hopefully they are useful to you too!☆13Updated 4 years ago
- This is the home of the CoinBlockerLists homepage.☆16Updated 6 years ago
- Indicator of Compromise Scanner for CVE-2019-19781☆58Updated 4 years ago
- pentest toolbox☆28Updated 2 years ago
- IP camera bruteforcer, 32 bit version☆14Updated 8 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆27Updated 4 months ago
- Nmap Web Dashboard and Reporting☆34Updated 2 years ago
- ☆13Updated 2 years ago
- Domain Seeker☆12Updated last year
- A standalone addon for GnuPG☆18Updated 5 years ago
- Scripts related to offensiveosint.io☆20Updated 4 years ago
- Emulate the handshake packets of an RDP server with python☆15Updated 6 years ago
- Hikvision IP-cam Bruteforce☆17Updated last year
- PowerShell wrapper for nmap, allows easy scanning of many hosts and subnets☆17Updated 6 years ago
- Scans an internal network using massscan and nmap☆20Updated 10 months ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Mikrotik SMB buffer overflow exploit☆63Updated 6 years ago
- Restructured and Collaborated SIEM and CVSS Infrastructure. Presented at Blackhat Asia Arsenal 2020.☆3Updated last year