kevinchevreuil / CApen-SSL
Create your own certification authority with server certificates in a full automated way
☆28Updated 8 months ago
Alternatives and similar repositories for CApen-SSL:
Users that are interested in CApen-SSL are comparing it to the libraries listed below
- Bruteforce DPAPI encrypted MasterKey File from Windows Credentials Manager☆19Updated 4 months ago
- Interactive simulation of a fictional ransomware group's dashboard☆12Updated 7 months ago
- Derrick is an advanced data leak scanning and CVE vulnerability analysis tool, designed for cybersecurity researchers and digital defense…☆28Updated 2 months ago
- ☆54Updated 3 months ago
- Speed up your pentest enumeration☆83Updated this week
- ☆55Updated 11 months ago
- Outil de sécurité des architectures kubernetes avancées☆50Updated 6 months ago
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆73Updated 2 weeks ago
- Identify the accounts most vulnerable to dictionary attacks☆119Updated last month
- This is a fully automated Active directory Lab made with the purpose to reduce the hustle of creating it manually.☆93Updated last year
- Automated Active Directory lab running on Proxmox☆75Updated 3 weeks ago
- VULNSPY regularly retrieves the latest alerts published by the CERT-FR and the related vulnerabilities with their CVSS score and allows y…☆38Updated 2 years ago
- DFIR ORC PARSER PROJECT☆25Updated 2 months ago
- ☆77Updated last year
- Track C2 servers, tools, and botnets over time by framework and location☆39Updated 3 months ago
- VirtualGHOST Detection Tool☆91Updated 11 months ago
- Cloudformation Template to Launch the SOC from Kali Purple☆51Updated last year
- ☆17Updated 2 years ago
- Docker images of the Exegol project☆106Updated this week
- ☆40Updated 8 months ago
- Outil de récupération automatique des données AZure / Automated tool for dumping Azure configuration data☆19Updated 3 weeks ago
- Azure AD enumeration over MS Graph☆81Updated 2 years ago
- Generate email permutations from a name and verify if this email exist with different providers (gmail, duckduckgo, yahoo, yandex)☆41Updated 2 months ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆42Updated 3 years ago
- CLI & library to search for default credentials among thousands of Products / Vendors☆50Updated 3 months ago
- ☆110Updated 6 months ago
- Generate graphs and charts based on password cracking result☆161Updated 2 years ago
- ThreatSeeker: Threat Hunting via Windows Event Logs☆120Updated last year
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆194Updated 4 months ago
- blog☆18Updated last month