mubix / windows-hardeningView external linksLinks
Because I can't find scripts to do this anywhere else...
☆26Dec 27, 2016Updated 9 years ago
Alternatives and similar repositories for windows-hardening
Users that are interested in windows-hardening are comparing it to the libraries listed below
Sorting:
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 7 years ago
- XMPP Man-in-the-Middle, quick & dirty☆41Feb 24, 2014Updated 11 years ago
- Find a useable IP address to use☆30Jul 4, 2014Updated 11 years ago
- Pull author and committer names and emails from Travis-CI☆11Aug 9, 2020Updated 5 years ago
- IP Address Listing Tool☆12Sep 1, 2013Updated 12 years ago
- Clone of Metasploit's wiki w/ additions☆17Nov 22, 2015Updated 10 years ago
- This is just a dumping ground for metasploit modules that I've worked on or am working on. Some have been submitted to Rapid7 and some h…☆17Jan 25, 2016Updated 10 years ago
- Does a dictionary lookup on common, valuable hostnames for a given domain.☆26May 1, 2022Updated 3 years ago
- Local privilege escalation scripts and tools☆17Aug 4, 2016Updated 9 years ago
- A better SSL cipher checker using gnutls☆28May 17, 2017Updated 8 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- ☆31Feb 24, 2014Updated 11 years ago
- Password cracking utility☆54Apr 6, 2021Updated 4 years ago
- Sonicwall Firewall decoder, username, password hash extract. Formats into John the Ripper☆25Jul 4, 2014Updated 11 years ago
- ArchAssault PKGBUILDs☆45Aug 15, 2015Updated 10 years ago
- Weape-Wireless-EAP-Extractor☆29Sep 1, 2013Updated 12 years ago
- PowerShell script to retreive wifi ESSIDs and Passwords.☆26Jul 28, 2017Updated 8 years ago
- Attack Knowledge Base☆101Jul 5, 2017Updated 8 years ago
- Basic app to practice modsec bypass☆22May 12, 2016Updated 9 years ago
- Flunym0us is a Vulnerability Scanner for Wordpress and Moodle designed by Flu Project Team. Flunym0us has been developed in Python. Flun…☆28Jan 15, 2017Updated 9 years ago
- Python object interface to requests/responses recorded by Burp Suite☆37Jan 21, 2020Updated 6 years ago
- Kojoney2 is a low interaction SSH honeypot written in Python. Based on Kojoney by Jose Antonio Coret☆39Jan 6, 2015Updated 11 years ago
- Bots for our fun lil IRC chatroom☆15Oct 25, 2023Updated 2 years ago
- ☆35Aug 29, 2012Updated 13 years ago
- Arp spoof detection tool☆26Jun 30, 2017Updated 8 years ago
- A tool to generate a custom code signing certificate chain and generate instructions to sign a binary. Useful for establishing persistenc…☆114Apr 16, 2016Updated 9 years ago
- Vulnerable Linux socket game for educational purposes☆22Apr 22, 2017Updated 8 years ago
- A collection of useful scripts for penetration testers☆83Oct 23, 2012Updated 13 years ago
- kali-sly-pi☆36Apr 24, 2019Updated 6 years ago
- A multi-codec media fuzzing tool.☆43Oct 9, 2012Updated 13 years ago
- MoneyX is an intentionally vulnerable JSP application used for training developers in application security concepts.☆31May 10, 2016Updated 9 years ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆35Nov 10, 2016Updated 9 years ago
- Remote Access Trojan(RAT), Miner, DDoS☆35Nov 14, 2016Updated 9 years ago
- A distributed data flow and computation system that runs on transactional messaging infrastructure☆11Oct 22, 2022Updated 3 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆16May 3, 2014Updated 11 years ago
- Rust bindings to aubio☆11Apr 13, 2020Updated 5 years ago
- Project exploring 3D volumetric rendering of NEXRAD radar data.☆11Oct 23, 2023Updated 2 years ago
- Implementing Kerberoast attack fully in python☆72Sep 29, 2018Updated 7 years ago