A Darktrace CLI written in Python
☆16Nov 28, 2019Updated 6 years ago
Alternatives and similar repositories for dtctl
Users that are interested in dtctl are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Notebooks created to attack and secure Active Directory environments☆27Nov 18, 2019Updated 6 years ago
- Tool for viewing Android package details, including permissions, services, activities, and more.☆22Nov 30, 2012Updated 13 years ago
- Leveraging kali Linux, hostapd and dnsmasq to spawn effective access points for wireless penetration tests.☆15Jan 16, 2021Updated 5 years ago
- A simple utility to check the status of and/or disable SMBv1 on Windows system via Cb Response's Live Response functionality.☆15May 28, 2019Updated 6 years ago
- Pdf File : Exfiltration and Uploading DATA by DNS Traffic (AAAA Records)☆10Jun 7, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Mapping your datasources and detections to the MITRE ATT&CK Navigator framework.☆61May 25, 2020Updated 5 years ago
- Tiny keylogger for Win XP/Vista/7/8 with ftp upload.☆14Apr 17, 2022Updated 4 years ago
- BloodHound Cypher Queries Ported to a Jupyter Notebook☆53Jun 20, 2020Updated 5 years ago
- A tool for Pentesters & BugHunters to collect IPs of company, server, Operating System & many more☆13Dec 20, 2022Updated 3 years ago
- The purpose of this tool is to collect all the subdomains using different subdomain finder tools and then filter out those subdomains whi…☆15Nov 21, 2022Updated 3 years ago
- attack2jira automates the process of standing up a Jira environment that can be used to track and measure ATT&CK coverage☆115Mar 26, 2023Updated 3 years ago
- C# code for Transferring Backdoor Payloads by IPv6 Address (AAAA) records and DNS Traffic also Bypassing Anti-viruses☆31Jun 5, 2023Updated 2 years ago
- Protecting Red Team infrastructure with cyber shield blocking AWS/AZURE/IBM/Digital Ocean/TOR/AV IP/ETC. ranges☆44Jul 31, 2022Updated 3 years ago
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Burp extension to specify the token value for the Authenication header while scanning.☆10Sep 18, 2018Updated 7 years ago
- A collection of OSCE preparation resources.☆24Oct 30, 2019Updated 6 years ago
- This tool will help in generating reverse shells easily for all types of OS.☆19Aug 4, 2023Updated 2 years ago
- An easy & free way to collect sponsorships for your projects.☆11Mar 9, 2023Updated 3 years ago
- Security Assessment Data Management and Analysis Tool☆38May 6, 2021Updated 4 years ago
- Twitter Words of Interest - Generate word lists from twitter searches☆31Nov 10, 2022Updated 3 years ago
- Social Engineering: Simple way to make a fake file for Backdoors☆24Jun 6, 2023Updated 2 years ago
- Python package for generating Linux iptables configurations.☆10Jul 1, 2021Updated 4 years ago
- Performs method enumeration and interrogation against flash remoting end points.☆38Aug 7, 2020Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Judge is a tool for scoring/debugging network services on a CCDC (or similar competition) network.☆21Oct 4, 2017Updated 8 years ago
- A collection of notebooks built for defensive and offensive operations.☆77Oct 13, 2020Updated 5 years ago
- A multithreaded rewrite of the classic theHarvester email address collection script.☆56Mar 26, 2026Updated last month
- Flame - Send vulnerabilities reports to SIEM☆15Jul 28, 2016Updated 9 years ago
- ☆66Feb 23, 2025Updated last year
- Vulnerability Scanner☆11Dec 23, 2014Updated 11 years ago
- VulnWhisperer Stack (ELK + VulnWhisperer + OpenVAS + Nessus)☆13Aug 14, 2018Updated 7 years ago
- CLI tool and python module which enables you to parse nessus scan files from Nessus and Tenable.SC by (C) Tenable, Inc.☆50Feb 7, 2026Updated 2 months ago
- This is my path to OSCP☆11Jun 16, 2018Updated 7 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- SpiderFoot automates OSINT collection so that you can focus on analysis.☆12Apr 20, 2023Updated 3 years ago
- Snapshot, patch, health-check, and potentially roll-back Windows VMs☆34Feb 20, 2018Updated 8 years ago
- Content for cyber defense course☆14Oct 15, 2014Updated 11 years ago
- Zone transfer a domain from its own NS servers and bruteforce subdomains☆12Mar 8, 2025Updated last year
- Python command line tool used for generating GIAC Certification indexes.☆31Jul 17, 2023Updated 2 years ago
- Scripts I have made for blue team☆16Apr 1, 2018Updated 8 years ago
- Leaked Mirai Source Code - make it vagrantized☆29Jun 8, 2021Updated 4 years ago