misterch0c / awesome-windows-domain-hardeningLinks
A curated list of awesome Security Hardening techniques for Windows.
☆19Updated 8 years ago
Alternatives and similar repositories for awesome-windows-domain-hardening
Users that are interested in awesome-windows-domain-hardening are comparing it to the libraries listed below
Sorting:
- zeus-style banking trojan☆14Updated 8 years ago
- Metasploit Usage Wiki☆48Updated 10 years ago
- Utilize Pastebin's scraping API to find interesting pastes.☆16Updated 5 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- HexInject is a very versatile packet injector and sniffer, that provide a command-line framework for raw network access.☆21Updated 7 years ago
- Malicious Link Blog☆25Updated last year
- Opens 1K+ IPs or Shodan search results and attempts to login☆147Updated 4 years ago
- Maltego with a twist of wireless☆25Updated 10 years ago
- cve-search - a tool to perform local searches for known vulnerabilities☆8Updated 8 years ago
- flood area with fake essids☆21Updated 7 years ago
- Specify targets and run sets of tools against them☆11Updated 10 years ago
- Security Advisories and Researches☆16Updated 10 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆48Updated 8 years ago
- Script for turning a Raspberry Pi into a Honey Pot Pi☆34Updated 8 months ago
- python code to connect to mail servers and pillage the data contained within☆10Updated 9 years ago
- Yet-Another-BlueTeam-Repo-YABTR. A Repo for a collection of FREE Blue team tools for both windows and Linux.. Not vendor buy to defend pr…☆2Updated 5 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 9 years ago
- USB-Rubber-Ducky Payload - Mimikatz in Memory w UAC Bypass☆35Updated 9 years ago
- A swiss army knife for pentesting Windows/Active Directory environments☆50Updated 9 years ago
- GUI Tool to generate threat intelligence information in various formats☆43Updated 7 years ago
- Offline Digital Forensics Tool for Binary Files☆38Updated 7 years ago
- See here:☆42Updated 12 years ago
- A few simple scripts and templates I have used during various phishing engagements.☆61Updated 10 years ago
- ☆15Updated 8 years ago
- Harvest FTP/POP/IMAP/HTTP/IRC creds☆167Updated 10 years ago
- Post-Exploitation Framework☆78Updated 8 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆39Updated 9 years ago
- my little bucket to store the delusions of grandeur I write in python :D☆30Updated 10 years ago
- A few transforms and a machine for parsing Nmap XML results☆38Updated 8 years ago
- Source code to the Malicious Demon Hunter Exploit Kit☆57Updated 9 years ago