mozilla / build-fwunitLinks
INACTIVE - http://mzl.la/ghe-archive - Unit Tests for your Network -
☆44Updated 6 years ago
Alternatives and similar repositories for build-fwunit
Users that are interested in build-fwunit are comparing it to the libraries listed below
Sorting:
- Find ssh keys with no passwords and try them against a bunch of hosts.☆46Updated 10 years ago
- Simple (web-) application vulnerability management system☆21Updated 11 years ago
- Network Defender Toolkit☆18Updated 12 years ago
- Portcullis Computer Security Co-ordinated Disclosure Toolkit☆25Updated 3 months ago
- Bash-completion script for Nmap☆72Updated 8 years ago
- Exfiltrate files via DNS☆95Updated 11 years ago
- 🎯 Vulnerability Pryer - Prying context into your vulnerability data☆21Updated 3 years ago
- module for osquery to load Bro logs into tables☆28Updated 10 years ago
- PFI (Port Forwarding Interceptor)☆46Updated 15 years ago
- A Python library for being a CND Batman....☆35Updated 9 years ago
- Things to know when DFIR occurs near a vault deployment.☆43Updated 7 years ago
- Store Burp data and collaborate via git☆53Updated 5 years ago
- CEF plugin for audisp (Linux Audit)☆23Updated 9 years ago
- Cli interface to threatcrowd.org☆19Updated 8 years ago
- Broctl plugin for automatically executing 'setcap' on each node after an install☆13Updated 4 years ago
- ☆12Updated 8 years ago
- Dockerfiles for NSM tools☆84Updated 8 years ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Updated 8 years ago
- AWS EC2 and S3 Security Auditing Tool☆41Updated 11 years ago
- Websocket based egress tester☆20Updated 8 years ago
- Common Vulnerabilities and Exposures - Portal. Archived and now replaced by vulnerability-lookup.org☆86Updated 5 months ago
- VPS infrastructure found in HT dumps☆26Updated 10 years ago
- Generate and Permutate Context Aware Dictionaries for Application Testing☆11Updated 9 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 9 years ago
- Collection of Auditd Examples and Presentations☆85Updated 4 years ago
- DEPRECATED USE v3!☆59Updated 9 years ago
- ☆44Updated 8 years ago
- Unpack MIME attachments from a file and check them against virustotal.com☆44Updated 9 years ago
- Find permanent WMI event consumers on endpoints that could be used by APT actors.☆17Updated 9 years ago
- It's like a polaroid, but for domains☆24Updated 10 years ago