Repository for Endpoint Security Testing
β35Jul 26, 2018Updated 7 years ago
Alternatives and similar repositories for Endpoint-Testing
Users that are interested in Endpoint-Testing are comparing it to the libraries listed below
Sorting:
- π‘ Monitor, analyze, & report security misconfigurations across environments.β18Oct 26, 2017Updated 8 years ago
- Custom stagers with python encrypting proxyβ40May 25, 2015Updated 10 years ago
- Fuzzing Frameworkβ10Oct 23, 2017Updated 8 years ago
- Cheat sheetsβ10Jul 4, 2016Updated 9 years ago
- Collection of dockerfiles to build containersβ13Mar 19, 2018Updated 7 years ago
- Windows login backdoor diagnostic toolβ11Apr 2, 2017Updated 8 years ago
- Native Android software for dumping memory from Android processesβ14Sep 18, 2014Updated 11 years ago
- Pull author and committer names and emails from Travis-CIβ11Aug 9, 2020Updated 5 years ago
- A pure Ruby library for parsing the XML out of an AndroidManifest.xml stored in an APK packageβ16Aug 5, 2016Updated 9 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.β17Aug 2, 2019Updated 6 years ago
- AI featured threat modeling and security review projectβ17Nov 17, 2024Updated last year
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers preseβ¦β13Jan 29, 2013Updated 13 years ago
- Merge results from NMAP and Masscan into one CSV fileβ18Jun 19, 2018Updated 7 years ago
- Internet Radio based on the Beaglebone Black platformβ15Mar 4, 2016Updated 9 years ago
- Terraform scripts for deploying OpenCTI to AWS, Azure, and GCPβ34Apr 2, 2024Updated last year
- Phactive - Monitoring an Environment with Nmap red teamingβ12May 11, 2019Updated 6 years ago
- Advanced Vulnerable Web Application (AVWA)β14Jun 10, 2017Updated 8 years ago
- Malware Samples. Uploaded to GitHub for those want to analyse the code.β34Nov 12, 2016Updated 9 years ago
- Fuzzing tool written in Golang. Insane monkey not included.β12Feb 22, 2018Updated 8 years ago
- A cookbook for managing the local security policy on a Windows systemβ13Apr 13, 2021Updated 4 years ago
- Clone of Metasploit's wiki w/ additionsβ17Nov 22, 2015Updated 10 years ago
- Remote Access Trojan(RAT), Miner, DDoSβ35Nov 14, 2016Updated 9 years ago
- The initial conversation slides and menu of scenariosβ38Jun 13, 2021Updated 4 years ago
- CVE-2018-2893β13Oct 7, 2018Updated 7 years ago
- β DEPRECATED: A secure jenkins installationβ17Jul 23, 2019Updated 6 years ago
- Cerberus is a toolkit to receive, parse, process and automate abuse reports handling received by ISP or hosting providers.β15Jun 11, 2019Updated 6 years ago
- post-exploitation toolsβ15Mar 27, 2018Updated 7 years ago
- XSS payload designed to steal LastPass users' credentialsβ16Apr 25, 2014Updated 11 years ago
- libssh CVE-2018-10933β21Oct 20, 2018Updated 7 years ago
- Search Nmap and Metasploit scanning scripts.β54Sep 18, 2017Updated 8 years ago
- β24Jan 19, 2020Updated 6 years ago
- Weblogic,CVE-2018-2894β18Sep 11, 2019Updated 6 years ago
- A tool to triage screenshotsβ20Jun 29, 2017Updated 8 years ago
- Metasploit Exploit Module for the Android addJavascriptInterface Issue (MITM)β36Jan 15, 2015Updated 11 years ago
- Tool that dumps beacon frames to a pcap file. Works on Windows Vista or Later with any Wireless Card.β27Mar 19, 2022Updated 3 years ago
- Checkpot Honeypot Checkerβ45Jan 20, 2019Updated 7 years ago
- β18Nov 6, 2016Updated 9 years ago
- Collection of single use scripts I worte for windows forensicsβ27Feb 1, 2012Updated 14 years ago
- Local privilege escalation scripts and toolsβ17Aug 4, 2016Updated 9 years ago