pentest-a2p2v / pentest-a2p2v-core
Core A2P2V functionality (command line based)
☆67Updated 9 months ago
Alternatives and similar repositories for pentest-a2p2v-core:
Users that are interested in pentest-a2p2v-core are comparing it to the libraries listed below
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆36Updated 5 years ago
- Oracle Database Penetration Testing Reference (10g/11g)☆35Updated 6 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- Any presentation we've given at FortyNorth Security☆34Updated 3 years ago
- OWASP Foundation Web Respository☆35Updated 3 years ago
- Easy to configure Honeypot for Blue Team☆38Updated 8 months ago
- Virtual Security Operations Center☆50Updated last year
- A fast multi threaded scanner for Citrix ADC (NetScaler) CVE-2019-19781 - Citrixmash / Shitrix☆35Updated 5 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- Collaborative pentest tool with highly customizable tools☆71Updated 3 years ago
- Some vulnerability research slides that I made☆12Updated 3 years ago
- ☆41Updated 2 years ago
- A collection of python apps and shell scripts to email an xlsx spreadsheet of new vulnerabilities in the NIST CVE database and their asso…☆12Updated 4 years ago
- Azur3Alph4 is a PowerShell module that automates red-team tasks for ops on objective. This module situates in a post-breach (RCE achieved…☆62Updated 3 years ago
- Take domains on stdin and output them on stdout if they get resolved☆33Updated 2 years ago
- Extensive code infrastructure for finding unintended information leaks in files, git repositories and much more.☆28Updated 2 years ago
- Lazarus analysis tools and research report☆55Updated last year
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆57Updated 4 years ago
- This tool gives developers, researchers and companies the ability to analyze software packages of different programming languages that ar…☆68Updated 3 years ago
- Perform CVE lookup on cvedetails.com☆24Updated last year
- PoC for CVE-2020-8617 (BIND)☆45Updated 4 years ago
- ☆26Updated 3 years ago
- Active C2 IoCs☆97Updated 2 years ago
- Slides and materials for conference presentations☆11Updated last year
- A collection of notes and rules (Snort/Suricata, Sigma, and YARA) to identify various samples of malware.☆14Updated 3 years ago
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆75Updated 2 years ago
- ReconPal: Leveraging NLP for Infosec☆55Updated 2 years ago
- ☆41Updated 10 months ago
- NSE script to detect ProxyOracle☆14Updated 3 years ago