uses keywords from alert logs to send SMS
☆24Nov 20, 2015Updated 10 years ago
Alternatives and similar repositories for SMS-LogAlert
Users that are interested in SMS-LogAlert are comparing it to the libraries listed below
Sorting:
- Registry Based Artifact Collection and Correlation☆10Aug 18, 2015Updated 10 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Apr 20, 2017Updated 8 years ago
- Tools for use with phishing frenzy☆11Jan 17, 2019Updated 7 years ago
- Automatically exported from code.google.com/p/hookme☆13Oct 8, 2015Updated 10 years ago
- A tool that can help detect and takeover subdomains with dead DNS records☆12Aug 23, 2018Updated 7 years ago
- A powershell script that prints a lot of IP and connection info to the screen☆31Jan 25, 2017Updated 9 years ago
- A keylogger - with lazy implementation - that sends logs through Gmail's SMTP.☆11Oct 10, 2015Updated 10 years ago
- A ton of helpful tools☆344Oct 8, 2021Updated 4 years ago
- Anonymous FTP Scanner Script- Generates IP's between two ranges, scans 21 and attempts a anonymous connection☆10Nov 23, 2014Updated 11 years ago
- DHCP Snooping app - great for finding rogue DHCP servers☆35Jan 25, 2018Updated 8 years ago
- ☆12Jul 17, 2017Updated 8 years ago
- ☆16Apr 4, 2015Updated 10 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆33Feb 26, 2016Updated 10 years ago
- Powershell Persistence Locator☆66Sep 11, 2016Updated 9 years ago
- Vulnerability Assessment and Penetration Testing Toolkit☆19Jan 5, 2022Updated 4 years ago
- A toolkit for CTFs☆14May 4, 2018Updated 7 years ago
- PHP Phishing Framework☆28Dec 28, 2013Updated 12 years ago
- Network Guardian☆12Jun 29, 2017Updated 8 years ago
- lulz: automated webstalking tool☆54Jun 3, 2016Updated 9 years ago
- OSSEC Decoder & Rulesets for Sysmon Events☆15Jul 23, 2015Updated 10 years ago
- A tiny chrome extension to record and replay your web application proof-of-concepts.☆20Dec 1, 2016Updated 9 years ago
- CRITs - Collaborative Research Into Threats☆21Mar 13, 2019Updated 6 years ago
- An attacker-oriented library for the Teensy 3.1 microcontroller.☆44Jan 11, 2015Updated 11 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- in-memory fuzzing with gdb☆21Feb 10, 2016Updated 10 years ago
- ARP spoof then session jack within your browser☆28Feb 10, 2014Updated 12 years ago
- packetstormsecurity.net exploit archive 133ch3r☆24Feb 22, 2011Updated 15 years ago
- Slack/Microsoft Teams notification for new Empire/Meterpreter checkins☆25Nov 19, 2024Updated last year
- Data exfiltration PoC scripts☆25Sep 11, 2015Updated 10 years ago
- ☆10Sep 11, 2021Updated 4 years ago
- A Metasploit auto auxiliary script☆103Oct 11, 2022Updated 3 years ago
- WPUpdate is a simple Linux service that automatically checks for a new version of Wordpress each night at 2AM.☆36Feb 7, 2014Updated 12 years ago
- Phishing Template Generation Made Easy☆165Nov 27, 2017Updated 8 years ago
- Simple bruteforcer for EDA2/HiddenTear based ransomware.☆27May 14, 2016Updated 9 years ago
- Email recon made fast and easy, with a framework to build on☆953Jan 12, 2023Updated 3 years ago
- Find a useable IP address to use☆30Jul 4, 2014Updated 11 years ago
- A simple worm that uses brute force and dictionary attacks through the network to infect vulnerable machines☆29Sep 28, 2015Updated 10 years ago
- 🖨️ Printer: Productivity Focused Next.js CLI Tool☆11Nov 24, 2023Updated 2 years ago
- Security information and event management, masters's diploma☆10Aug 3, 2015Updated 10 years ago