noraj / unisecLinks
Unicode Security Toolkit
☆21Updated last month
Alternatives and similar repositories for unisec
Users that are interested in unisec are comparing it to the libraries listed below
Sorting:
- Dominate the Active Directory game. An Active Directory environments pentest tool complementary to existing ones like NetExec.☆18Updated last month
- Central IoC scanner based on Loki☆20Updated 4 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 3 years ago
- Enumeration & fingerprint tool☆24Updated last year
- CLI & library to search for default credentials among thousands of Products / Vendors☆55Updated last month
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 5 years ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆10Updated 9 years ago
- Distributed Nmap, wrapper around Nmap to allow distributed network enumeration.☆20Updated 8 months ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 5 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆38Updated 3 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆25Updated 3 weeks ago
- A tool for simplifying the process of researching IOCs.☆25Updated 4 years ago
- Real-time updated lists of U.S. GovCloud IP ranges on Amazon AWS, Microsoft Azure, Google GCP☆18Updated last year
- Nmap Web Dashboard and Reporting☆34Updated 3 years ago
- CLI & library to search for default credentials among thousands of Products / Vendors☆69Updated 4 years ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆45Updated 5 years ago
- Legba recipes.☆51Updated last year
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆36Updated 2 weeks ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- It was developed to speed up the processes of SOC Analysts during analysis☆47Updated last year
- Modular framework to exploit UPS devices☆65Updated 2 years ago
- NightWriter is a modern real-time collaborative editing tool secured by end-to-end encryption.☆18Updated 4 years ago
- New Framework Red Team Operations☆20Updated 4 years ago
- ☆12Updated last year
- Toolkit for manual buffer exploitation, which features a basic network socket fuzzer, offset pattern generator and detector, bad characte…☆24Updated 6 years ago
- An optimized Python3 library to fetch the most recent exploit-database, create searchable indexes for CVE->EDBID and EDBID -> CVE, and pr…☆30Updated last year
- An example of a mis-configured Rails application release under MIT license.☆21Updated 3 years ago
- Script for importing Nmap results into a Neo4j Graph Database☆24Updated 9 months ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆76Updated last year
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆28Updated last year