k4yt3x / network-security-checklist
A checklist for defending private or corporate networks.
☆15Updated 5 years ago
Alternatives and similar repositories for network-security-checklist:
Users that are interested in network-security-checklist are comparing it to the libraries listed below
- Asleap - Cisco LEAP and Generic MS-CHAPv2 Dictionary Attack☆87Updated 3 years ago
- A tool to parse Firefox and Chrome HSTS databases into forensic artifacts!☆26Updated 6 months ago
- This repository contains additional files mentioned in the blog post☆22Updated 5 years ago
- 📰 Security RSS List 📰☆51Updated 4 years ago
- The RIPE NCC DNS Monitoring Service (DNSMON) provides a comprehensive, objective and up-to-date overview of the quality of the service of…☆29Updated 7 months ago
- Blue Team Powershell Script☆18Updated 3 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆73Updated 2 months ago
- A Simple Log4j Indicator of Compromise Linux Detector☆14Updated 3 years ago
- A multicast DNS and DNS Service Discovery Security Assessment Tool☆68Updated last year
- vyos based isolation of networks☆11Updated 4 years ago
- ☆14Updated 9 months ago
- ☆20Updated 4 years ago
- Extract credentials and other useful info from network captures☆65Updated 2 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Updated 5 years ago
- Basic RDP honeypot script☆29Updated last year
- Fork from @rsmudge/armitage☆33Updated 2 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated 3 months ago
- Tool to find and extract credentials from phone configuration files hosted on CUCM☆101Updated 5 years ago
- Strafer: A tool to detect potential infections in Elasticsearch instances☆27Updated 3 years ago
- Resources for I Want My EIP, presented at Derbycon 2017☆11Updated 7 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Updated 4 years ago
- Generates an HTML view of the contents of a PCAP file☆14Updated 4 years ago
- passat - password auditing tool. Does statistical analyses on large sets of cracked passwords.☆24Updated 2 years ago
- Utilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network☆28Updated 5 years ago
- A Spicy protocol analyzer for WireGuard☆29Updated 4 years ago
- A learning and testing environment for web application hacking and pentesting.☆26Updated 4 years ago
- Test script for CVE-2020-1472 for both RPC/TCP and RPC/SMB☆57Updated last year
- Anti-forensic monitor program: watches for signs of tampering and purges keys/shuts everything down.☆29Updated 8 years ago
- Open platform for sharing malware distribution sites☆37Updated 2 months ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 3 months ago