Clean public password dump files and store in ELK
☆36Jan 24, 2018Updated 8 years ago
Alternatives and similar repositories for PasswordDump2ELK
Users that are interested in PasswordDump2ELK are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PowerShell Memory Pulling script☆19Mar 24, 2015Updated 11 years ago
- Exploits developped by Outflank B.V. team members☆21Jan 26, 2017Updated 9 years ago
- Vulnerability Assessment Module - OpenVas with Elastic stack using VulnWhisperer☆20Jun 11, 2019Updated 6 years ago
- Start here!☆11Feb 19, 2020Updated 6 years ago
- Uses viewdns.info to perform a reverse NS lookup on a specified nameserver and attempts zone transfers on discovered domains☆19May 2, 2019Updated 6 years ago
- Sniffs sensitive data from interface or pcap☆14Feb 19, 2018Updated 8 years ago
- OneDrive, operating on Microsoft Windows 11 Pro is vulnerable to DLL hijacking.☆21Nov 9, 2023Updated 2 years ago
- Code for blogpost: https://outflank.nl/blog/2018/10/25/building-resilient-c2-infrastructues-using-dns-over-https/☆55Oct 25, 2018Updated 7 years ago
- Registry to JSON. This Project is for learning purposes and is not maintained.☆12Dec 28, 2021Updated 4 years ago
- Deploy MISP Project software with Vagrant.☆45Jun 15, 2020Updated 5 years ago
- Federated Office365 user enumeration based on correlated response trend analysis☆49May 3, 2022Updated 3 years ago
- Quick and dirty .net console app for querying mssql servers.☆24Aug 30, 2018Updated 7 years ago
- ☆19Aug 26, 2020Updated 5 years ago
- Tool for analysts to perform simultaneous lookups (IP, Domain, URL, MD5) against multiple data sources☆28Jan 27, 2017Updated 9 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆110Sep 26, 2017Updated 8 years ago
- Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources☆13Jun 24, 2018Updated 7 years ago
- Miscellaneous PowerShell scripts for red team activities☆16Jan 15, 2026Updated 2 months ago
- A realistic windows testlab deployment tool☆12Feb 24, 2017Updated 9 years ago
- Splunk App to assist Sysmon Threat Hunting☆38Mar 7, 2017Updated 9 years ago
- LNK to JSON☆14Mar 7, 2019Updated 7 years ago
- ☆34Jul 23, 2018Updated 7 years ago
- Assorted BloodHound Cypher queries/tricks I haven't seen in other cheat sheets☆12Jun 21, 2021Updated 4 years ago
- A PowerShell script to parse the docx/docm file format and update the template location.☆17Oct 15, 2019Updated 6 years ago
- Sp00fer blog post -☆24Jul 19, 2022Updated 3 years ago
- ☆94Nov 1, 2018Updated 7 years ago
- A systemd-enabled Kali Linux Docker image, in the spirit of geerlingguy/docker-debian11-ansible.☆15Mar 9, 2026Updated 2 weeks ago
- A virtual MediaWiki development environment, built on Vagrant, VirtualBox, and Puppet.☆16Dec 1, 2016Updated 9 years ago
- ☆25Jan 16, 2026Updated 2 months ago
- Splunk Dashboard for CobaltStrike logs☆90Mar 16, 2021Updated 5 years ago
- Comprehensive Pivoting Framework☆20Sep 20, 2016Updated 9 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- Egressbuster is a method to check egress filtering and identify if ports are allowed. If they are, you can automatically spawn a shell.☆12Mar 14, 2018Updated 8 years ago
- Find plaintext credentials from emails in bulk from password dumps, and generate emails on the fly.☆49Apr 9, 2019Updated 6 years ago
- malicious file maker/sender to create and send malicious attachments to test your email filter/alerting☆71Oct 19, 2017Updated 8 years ago
- C# exfiltration tool☆13Sep 24, 2021Updated 4 years ago
- Elastic Beat for fetching and shipping Office 365 audit events☆66Sep 9, 2020Updated 5 years ago
- A program to map out SPF and DKIM records for a large number of domains☆39Apr 1, 2015Updated 10 years ago
- Wounty is a simple web enumeration script that makes use of other popular tools to automate the early stages of recognition in Bug Bounty…☆14Feb 6, 2022Updated 4 years ago
- Identify common attack paths to get Domain Administrator☆21Aug 20, 2019Updated 6 years ago