punk-security / pwnspoofLinks
Pwnspoof repository
☆262Updated last year
Alternatives and similar repositories for pwnspoof
Users that are interested in pwnspoof are comparing it to the libraries listed below
Sorting:
- Repository resource for threat hunter☆158Updated 6 years ago
- Some Threat Hunting queries useful for blue teamers☆127Updated 3 years ago
- Blue Team detection lab created with Terraform and Ansible in Azure.☆161Updated 7 months ago
- MAD ATT&CK Defender: ATT&CK Adversary Emulation Repository☆117Updated 2 years ago
- A detailed guide showing you different ways you can incorporate Python into your workflows around Nmap.☆150Updated 3 years ago
- Russia / Ukraine 2022 conflict related IOCs from CERT Orange Cyberdefense Threat Intelligence Datalake☆175Updated 2 years ago
- SECMON is a web-based tool for the automation of infosec watching and vulnerability management with a web interface.☆221Updated 3 years ago
- An open-source self-hosted purple team management web application.☆276Updated 2 months ago
- Collect information of Windows PC when doing incident response☆253Updated 2 years ago
- Completely Risky Active-Directory Simulation Hub☆103Updated last year
- Useful resources about phishing email analysis☆84Updated 5 months ago
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆326Updated 2 months ago
- Open Threat Hunting Framework☆117Updated 2 years ago
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆158Updated 3 years ago
- ☆160Updated last year
- Purple Team Resources for Enterprise Purple Teaming: An Exploratory Qualitative Study by Xena Olsen.☆656Updated 2 years ago
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆144Updated 2 weeks ago
- A Python package is used to execute Atomic Red Team tests (Atomics) across multiple operating system environments.☆138Updated last year
- Course repository for PowerShell for Pentesters Course☆432Updated 3 years ago
- Ansible playbook to deploy a phishing engagement in the cloud.☆219Updated 3 years ago
- A PoC ransomware sample to test out your ransomware response strategy.☆211Updated 3 months ago
- Incident Response collection and processing scripts with automated reporting scripts☆306Updated last year
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆204Updated 2 years ago
- A powerful and user-friendly browser extension that streamlines investigations for security professionals.☆397Updated 2 months ago
- ☆122Updated last year
- Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.☆469Updated last year
- MAL-CL (Malicious Command-Line)☆314Updated 2 years ago
- Tools for simulating threats