jordan-wright / infosec-resourcesLinks
A List of InfoSec Resources
☆10Updated 11 years ago
Alternatives and similar repositories for infosec-resources
Users that are interested in infosec-resources are comparing it to the libraries listed below
Sorting:
- Discover potential timestamps within the Windows Registry☆19Updated 11 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Updated 9 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 10 years ago
- Various pentest scripts☆14Updated 11 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Updated 9 years ago
- Metadata Inspection Database Alerting System☆42Updated 12 years ago
- Local privilege escalation scripts and tools☆17Updated 9 years ago
- Normalizer for honeypot data.☆45Updated 10 years ago
- Phishing Toolkit☆20Updated 7 years ago
- Network Defender Toolkit☆18Updated 12 years ago
- YAPDNS☆39Updated 10 years ago
- Advanced HTTP fingerprinting PoC☆45Updated 8 years ago
- Exploit kit analyzer☆22Updated 10 years ago
- Passive DHCP analyzer with OS fingerprinting on the LAN through DHCP☆13Updated 8 years ago
- A virtual PDF analysis framework☆17Updated 11 years ago
- Lite version of PDF X-RAY that uses no backend☆36Updated 14 years ago
- My Quick Note of BlackHat 2015 Arsenal☆26Updated 10 years ago
- Bash scripts to help setup port redirects with iptables☆16Updated 8 years ago
- malware-encyclopedias is a set of tools to gather malware names and descriptions☆19Updated 9 years ago
- VPS infrastructure found in HT dumps☆26Updated 10 years ago
- DNS Enumeration and Reconnaissance Tool☆36Updated 9 years ago
- Find useful stuff in pastebin☆23Updated 12 years ago
- The Swiss army knife of byte manipulation☆43Updated 9 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21Updated 11 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 12 years ago
- Collection of information security policies.☆29Updated 8 years ago
- Cross Distribution Exploit Testing☆28Updated 10 years ago
- Python script to efficiently find files on UNIX like file systems with specific properties (quicker than find)☆19Updated 10 years ago
- Enabling 2fac confirmation for newly connected USB devices☆45Updated 9 years ago
- Next Generation of White Chapel☆21Updated 11 years ago