punk-security / pwnspoofLinks
Pwnspoof repository
☆264Updated 2 years ago
Alternatives and similar repositories for pwnspoof
Users that are interested in pwnspoof are comparing it to the libraries listed below
Sorting:
- Repository resource for threat hunter☆158Updated 7 years ago
- A detailed guide showing you different ways you can incorporate Python into your workflows around Nmap.☆150Updated 4 years ago
- Blue Team detection lab created with Terraform and Ansible in Azure.☆175Updated last year
- Some Threat Hunting queries useful for blue teamers☆131Updated 3 years ago
- SECMON is a web-based tool for the automation of infosec watching and vulnerability management with a web interface.☆218Updated 3 years ago
- MAD ATT&CK Defender: ATT&CK Adversary Emulation Repository☆127Updated 2 years ago
- Useful resources about phishing email analysis☆86Updated 11 months ago
- Top ATT&CK Techniques helps defenders approach the breadth and complexity of MITRE ATT&CK® with a prioritized top 10 list of techniques t…☆121Updated 7 months ago
- A collection of intelligence about Log4Shell and its exploitation activity.☆184Updated 3 years ago
- An open-source self-hosted purple team management web application.☆296Updated last week
- Russia / Ukraine 2022 conflict related IOCs from CERT Orange Cyberdefense Threat Intelligence Datalake☆174Updated 3 years ago
- ☆160Updated 2 years ago
- Creation of a laboratory for malware analysis in AWS☆104Updated 3 years ago
- ☆175Updated 2 years ago
- A PoC ransomware sample to test out your ransomware response strategy.☆212Updated last month
- Purple Team Resources for Enterprise Purple Teaming: An Exploratory Qualitative Study by Xena Olsen.☆672Updated 2 years ago
- A Python package is used to execute Atomic Red Team tests (Atomics) across multiple operating system environments.☆136Updated last year
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆164Updated 3 years ago
- SIEM Cheat Sheet☆77Updated 2 years ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆207Updated 3 years ago
- Ansible playbook to deploy a phishing engagement in the cloud.☆223Updated 3 years ago
- Tool to discover external and internal network attack surface☆203Updated last year
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆342Updated last month
- Completely Risky Active-Directory Simulation Hub☆102Updated 2 years ago
- Open Threat Hunting Framework☆123Updated 2 years ago
- Collect information of Windows PC when doing incident response☆253Updated 2 years ago
- Course repository for PowerShell for Pentesters Course☆436Updated 3 years ago
- Active Directory Generator files for Movement, Pivoting, and Persistence for Pentesters and Ethical Hackers.☆216Updated 3 years ago
- Incident Response collection and processing scripts with automated reporting scripts☆318Updated last year
- ☆125Updated last year