qeeqbox / falconLinks
Collection of exploits that were verified by an automated system
☆13Updated 4 years ago
Alternatives and similar repositories for falcon
Users that are interested in falcon are comparing it to the libraries listed below
Sorting:
- Pure Honeypots with an automated bash script☆20Updated 4 years ago
- ☆14Updated 4 years ago
- ☆33Updated 8 months ago
- Custom security distro for remote penetration testing☆55Updated 4 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 10 months ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Updated 5 years ago
- buffer overflow examples☆22Updated 7 years ago
- Network and web related exploratory playground.☆19Updated 9 years ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆13Updated 4 years ago
- A Darktrace CLI written in Python☆16Updated 5 years ago
- HoneyDB Python Module☆14Updated last year
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆37Updated 4 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆53Updated 5 years ago
- DPE - Default Password Enumeration☆35Updated 12 years ago
- Pentest ToolKit☆28Updated 5 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Updated 3 years ago
- A collection of personal ZAP scripts☆14Updated 2 years ago
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆23Updated 8 years ago
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)☆46Updated 4 years ago
- Agile Sandbox for analyzing Windows, Linux and macOS malware and execution behaviors☆73Updated last year
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 5 years ago
- Brute force password selection for EAP-MD5 authentication exchanges☆26Updated 8 years ago
- Data exfiltration and covert communication tool☆39Updated 2 years ago
- ☆53Updated 4 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆37Updated 7 years ago
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆62Updated 7 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads