michael-fischer / SaintconPython
One Day of Python for SaintCon 2022
☆11Updated 2 years ago
Alternatives and similar repositories for SaintconPython:
Users that are interested in SaintconPython are comparing it to the libraries listed below
- Reporting Tips for Penetration Testers☆31Updated 3 years ago
- ☆16Updated 7 years ago
- A companion tool for BloodHound offering Active Directory statistics and number crunching☆64Updated 6 years ago
- ☆76Updated 6 years ago
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 2 years ago
- Mitre Att&ck Technique Emulation☆82Updated 5 years ago
- This PowerShell script will determine if your connection to external servers over HTTPS is being decrypted by an intercepting proxy such …☆67Updated 6 years ago
- Helps with finding and registering categorized domains☆67Updated 3 years ago
- Passive internal reconnaissance tool☆67Updated 2 years ago
- Send your nessus compliance and vulnerability scan data to ElasticSearch☆27Updated 6 years ago
- A cloud-backed password cracking and assessment tool - Sponsored by Open Security☆68Updated 2 years ago
- Credit to Helge Klein - https://helgeklein.com/blog/2015/02/creating-realistic-test-user-accounts-active-directory/☆69Updated 6 years ago
- Powershell - web traffic whitenoise generator☆46Updated 4 years ago
- ☆98Updated 5 years ago
- ☆138Updated 5 years ago
- 504 VSAgent☆23Updated 6 years ago
- Splunk App to assist Sysmon Threat Hunting☆38Updated 7 years ago
- A collection of hunting and blue team scripts. Mostly others, some my own.☆38Updated 2 years ago
- Password spraying script and helper for creating password lists☆33Updated 4 years ago
- ☆41Updated 6 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- ☆52Updated 6 years ago
- ☆40Updated 4 years ago
- Let's obscure some IPv4 addresses☆36Updated 2 years ago
- Presentation Slides☆27Updated 5 years ago
- ☆55Updated 4 years ago
- All my slides for any talks☆23Updated 3 months ago
- The project was moved here https://github.com/atomic-threat-coverage/atomic-threat-coverage☆24Updated 5 years ago
- rules to identify files containing juicy information like usernames, passwords etc☆127Updated 7 years ago
- ☆19Updated 3 years ago