psmitty7373 / cop
Web-based Collaborative Common Operating Picture Tool (COP)
☆25Updated 3 years ago
Alternatives and similar repositories for cop:
Users that are interested in cop are comparing it to the libraries listed below
- ☆27Updated 5 years ago
- A little utility to convert nmap xml results to markdown tables☆67Updated 2 years ago
- Startup project to create a simple to deploy honey pot style detection tool for alerting on common network attacks☆40Updated 4 years ago
- Ansible playbook to deploy a phishing engagement in the cloud.☆218Updated 2 years ago
- Collection of some of my own tools with other great open source tools out there packaged into a powershell module☆143Updated 2 years ago
- Powershell script to extract information from boot PXE☆139Updated 5 years ago
- A repo to support the book☆106Updated 3 years ago
- Identifies the bytes that Microsoft Defender flags on.☆82Updated 2 years ago
- ☆48Updated 3 years ago
- BloodHound Docker Ready to Use☆87Updated last year
- Tuoni☆82Updated this week
- EZEA (EaZy Enum Automator), made for OSCP. This tool uses bash to automate most of the enumeration proces☆99Updated 3 years ago
- Low and slow password spraying tool, designed to spray on an interval over a long period of time☆193Updated last week
- [S]imple [T]actical [A]gent [R]elay: A peer-to-peer C2-ish framework for Ethical Hackers and Security Researchers.☆31Updated 3 years ago
- Custom PowerShell module to setup an Active Directory lab environment to practice penetration testing.☆173Updated 3 years ago
- ☆189Updated 5 years ago
- ☆102Updated last year
- How to ARM Yourself - Bsides Tampa 2020☆14Updated 4 years ago
- ☆77Updated 5 years ago
- Everyone's favorite SMB/SAMBA/CIFS enumeration tool ported over to Python.☆85Updated 3 years ago
- Test tool for CVE-2020-1472☆34Updated last year
- TunnelPy simply exposes any service, running internally in a network/host, to the outside, by creating a tunnel between a client on the o…☆21Updated 4 years ago
- Modular Enumeration and Password Spraying Framework☆116Updated 10 months ago
- A Python API for Hack the Box platform interaction☆64Updated 4 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆221Updated 3 years ago
- Infrastructure Automation☆337Updated 10 months ago
- HoneyCreds network credential injection to detect responder and other network poisoners.☆216Updated 3 years ago
- Malware As A Service☆130Updated 11 months ago
- Browser extension that extracts users from LinkedIn company pages☆156Updated last year
- Active Directory Generator files for Movement, Pivoting, and Persistence for Pentesters and Ethical Hackers.☆209Updated 2 years ago