martymcflywa / ecu
☆11Updated 5 years ago
Alternatives and similar repositories for ecu:
Users that are interested in ecu are comparing it to the libraries listed below
- ZAP plugin demonstrating custom view for WebSocket messages.☆13Updated 2 years ago
- Some Powershell scripts developed during my security consulting work. Hopefully they are useful to you too!☆13Updated 4 years ago
- Restructured and Collaborated SIEM and CVSS Infrastructure. Presented at Blackhat Asia Arsenal 2020.☆3Updated 2 years ago
- Powershell script to run and determine if a specific device has been patched for CVE-2019-0708. This checks to see if the termdd.sys fil…☆18Updated 5 years ago
- Resources for I Want My EIP, presented at Derbycon 2017☆11Updated 7 years ago
- A utility for password spraying using kerberos from an untrusted/non-domain joined Kali linux host. Useful for user and KDC/DC enumeratio…☆18Updated last year
- A class validation and transformation library, to ensure secure data structures in Python.☆9Updated 8 months ago
- Useful Windows and AD tools☆15Updated 2 years ago
- Firepower Threat Defense Virtual templates and artifacts☆13Updated 4 years ago
- Tool designed to study the answers of your DNS resolver and make easier the identification of techniques such as DNS Hijacking/Poisoning☆27Updated 6 years ago
- Brute Force and Scan WinRm Service☆13Updated 5 years ago
- Backdoor detection for VMware view☆13Updated 3 years ago
- Mass deploy and update Suricata IDPS using Ansible IT automation platform☆9Updated 10 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Updated 10 years ago
- Comae Stardust Command Line (Powershell & Python)☆1Updated 2 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆12Updated 8 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 3 months ago
- PoC for CVE-2020-11651☆6Updated 4 years ago
- A collection of Metasploit plugins I have written for various reasons.☆15Updated 4 years ago
- Do the unexpected with AD GPO processing☆9Updated 5 years ago
- Metasploit modules, powershell scripts and custom exploit to perform local privilege escalation on windows systems.☆10Updated 7 years ago
- ☆20Updated 4 years ago
- Collection of single use scripts I worte for windows forensics☆27Updated 12 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆14Updated 9 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- A utility to force query DNS over DoH off of CloudFlare API when DNS block is in place☆10Updated 6 years ago
- Registry timestamp manipulation☆16Updated 10 years ago
- Repository for OWASP Code Review document☆16Updated 10 years ago
- Standardizing Security Titles☆13Updated 2 years ago
- Free and open cyber-security auditing tool with collective intelligence☆21Updated 5 years ago