uses keywords from alert logs to send SMS
☆24Nov 20, 2015Updated 10 years ago
Alternatives and similar repositories for SMS-LogAlert
Users that are interested in SMS-LogAlert are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Registry Based Artifact Collection and Correlation☆10Aug 18, 2015Updated 10 years ago
- Tools for use with phishing frenzy☆11Jan 17, 2019Updated 7 years ago
- CRITs - Collaborative Research Into Threats☆21Mar 13, 2019Updated 7 years ago
- A ton of helpful tools☆345Oct 8, 2021Updated 4 years ago
- A tool that can help detect and takeover subdomains with dead DNS records☆12Aug 23, 2018Updated 7 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- PHP Phishing Framework☆28Dec 28, 2013Updated 12 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Apr 20, 2017Updated 9 years ago
- DHCP Snooping app - great for finding rogue DHCP servers☆35Jan 25, 2018Updated 8 years ago
- Sell anything online, safely and anonymously.☆122Oct 20, 2016Updated 9 years ago
- A powershell script that prints a lot of IP and connection info to the screen☆31Jan 25, 2017Updated 9 years ago
- ☆73Jul 22, 2017Updated 8 years ago
- Script to extract malicious payload and decoy document from CVE-2015-1641 exploit documents☆23Jan 10, 2017Updated 9 years ago
- Anonymous FTP Scanner Script- Generates IP's between two ranges, scans 21 and attempts a anonymous connection☆10Nov 23, 2014Updated 11 years ago
- ☆25Jan 18, 2015Updated 11 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Modified edition of cuckoo☆18Feb 14, 2018Updated 8 years ago
- Binary resource copier☆96Apr 14, 2025Updated last year
- Python bindings to libhtp☆31Oct 13, 2020Updated 5 years ago
- A keylogger - with lazy implementation - that sends logs through Gmail's SMTP.☆12Oct 10, 2015Updated 10 years ago
- Email recon made fast and easy, with a framework to build on☆955Jan 12, 2023Updated 3 years ago
- Simple tool to automate adding shellcode to PE files☆49Apr 10, 2018Updated 8 years ago
- Simple bruteforcer for EDA2/HiddenTear based ransomware.☆27May 14, 2016Updated 9 years ago
- ☆14Sep 18, 2015Updated 10 years ago
- GNU OS Cross-Compiler☆13Dec 26, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Tools used for Penetration testing / Red Teaming☆66Dec 4, 2018Updated 7 years ago
- Vulnerability Assessment and Penetration Testing Toolkit☆18Jan 5, 2022Updated 4 years ago
- An attacker-oriented library for the Teensy 3.1 microcontroller.☆44Jan 11, 2015Updated 11 years ago
- Simple NGram Fast Indexer & Searcher☆37Jan 6, 2023Updated 3 years ago
- Listening Post for Throwback Implant☆111Jan 26, 2016Updated 10 years ago
- A toolkit for CTFs☆14Mar 19, 2026Updated last month
- Security information and event management, masters's diploma☆10Aug 3, 2015Updated 10 years ago
- \ PowerAvails Powershell /☆10Jun 30, 2018Updated 7 years ago
- Automatically exported from code.google.com/p/jamaal-re-tools☆13Oct 4, 2015Updated 10 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Tools for harvesting email addresses for phishing attacks |☆85Sep 9, 2015Updated 10 years ago
- ARP spoof then session jack within your browser☆28Feb 10, 2014Updated 12 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆33Feb 26, 2016Updated 10 years ago
- Network Guardian☆12Jun 29, 2017Updated 8 years ago
- Miscellaneous parsing scripts for penetration testing☆12Jul 17, 2023Updated 2 years ago
- simple reverse tcp backdoor hack☆63Oct 2, 2020Updated 5 years ago