picatz / falconzLinks
🦅 Falcon Malware Sandbox APIv2 Connector
☆29Updated 2 years ago
Alternatives and similar repositories for falconz
Users that are interested in falconz are comparing it to the libraries listed below
Sorting:
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- Monitor Certificate Transparency Logs For Phishing Domains☆25Updated 6 years ago
- Mattermost - Shodan Slash command☆31Updated 8 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- Puny Domain Name Check☆37Updated 5 years ago
- Honeypot for router backdoor (TCP 32764)☆18Updated 11 years ago
- collection of useful shells for penetration tests☆37Updated 8 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 7 years ago
- Yet-Another-BlueTeam-Repo-YABTR. A Repo for a collection of FREE Blue team tools for both windows and Linux.. Not vendor buy to defend pr…☆2Updated 6 years ago
- An active domain name query tool to help keep track of domain name movements...☆15Updated 4 years ago
- A very simple Python script to take screenshots of websites☆18Updated 7 years ago
- Phishing Toolkit☆20Updated 7 years ago
- My Quick Note of BlackHat 2015 Arsenal☆27Updated 9 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Updated 14 years ago
- Security Product Taskbar Icons (to identify from screenshots)☆57Updated 5 years ago
- Invoke remote powershell scripts in memory of compromised hosts.☆11Updated 10 years ago
- GUI Tool to generate threat intelligence information in various formats☆43Updated 7 years ago
- Set of PoC for exploits for QRadar SIEM☆15Updated 7 years ago
- Scan web server for known webshell names and responses☆50Updated 8 years ago
- 📡 A security research tool with shodan integration☆25Updated 6 years ago
- ssh session type for metasploit☆99Updated 2 years ago
- Truehunter☆31Updated 4 years ago
- A Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).☆64Updated 6 years ago
- Custom slash command to do a basic dnsrecon from within Slack☆12Updated 9 years ago
- Microsoft Windows HTA (HTML Application) - Remote Code Execution☆30Updated 9 years ago
- A curated list of tools for incident response☆29Updated last year
- Search bing with python☆12Updated 10 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆42Updated 4 years ago