Detect and remove the presence of canary tokens
☆25Dec 9, 2023Updated 2 years ago
Alternatives and similar repositories for canarytokendetector
Users that are interested in canarytokendetector are comparing it to the libraries listed below
Sorting:
- Signature based honeypot detector tool written in Golang☆108Mar 22, 2025Updated 11 months ago
- The NSE Script plugin integrates with Criminal IP CTI search engine for network scanning, showing IP details like WHOIS, running products…☆15Nov 29, 2023Updated 2 years ago
- Silver SAML forgery tool☆56Feb 26, 2024Updated 2 years ago
- Automated (kinda) deployment of MalRDP infrastructure with Terraform & Ansible☆12Sep 15, 2023Updated 2 years ago
- Portable Arch Linux☆15Mar 29, 2025Updated 11 months ago
- Fetch & Filter Known URLs☆15Aug 3, 2022Updated 3 years ago
- A repo & website that builds a ton of appbundles, weekly, completely automated. Firefox, Chromium, inkscape, ppsspp, steam, thunar, xfce …☆23Feb 12, 2026Updated 3 weeks ago
- Free Advance encryptor for Anon Cloud☆16Jan 26, 2023Updated 3 years ago
- Exploit for elevation of privilege vulnerability in QuickHeal's Seqrite EPS (CVE-2023-31497).☆18Oct 30, 2023Updated 2 years ago
- Add Shadow Credentials to a target object by editing their msDS-KeyCredentialLink attribute☆25Jun 5, 2024Updated last year
- Attempt zone transfers on domains☆18Jul 12, 2021Updated 4 years ago
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆23Jun 7, 2017Updated 8 years ago
- ☆15Sep 21, 2019Updated 6 years ago
- Site fast fuzzing with chorme extension.☆24Feb 4, 2022Updated 4 years ago
- ☆25Apr 28, 2024Updated last year
- RedDrop is a quick and easy web server for capturing and processing encoded and encrypted payloads and tar archives.☆57Dec 17, 2024Updated last year
- Strafer: A tool to detect potential infections in Elasticsearch instances☆27Mar 14, 2021Updated 4 years ago
- ☆31Jul 26, 2024Updated last year
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆31Jan 17, 2022Updated 4 years ago
- From Zero To Hero☆34Jul 17, 2025Updated 7 months ago
- ☆28Jun 10, 2016Updated 9 years ago
- A wrapper around the Proxmark3 client that will alert the user of specific events☆30Dec 13, 2020Updated 5 years ago
- A LAPS dumper written using the impacket library.☆32May 22, 2023Updated 2 years ago
- Handy scripts and one-liners to make life easier☆36Mar 6, 2023Updated 3 years ago
- Defence Against the Dark Arts☆34Sep 15, 2019Updated 6 years ago
- ☆40Oct 8, 2024Updated last year
- Passive Web Vulnerability Detection Tool☆37May 5, 2025Updated 10 months ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆41May 31, 2024Updated last year
- BlueKeep powershell scanner (based on c# code)☆39Nov 11, 2019Updated 6 years ago
- Automatic multiprocess Linux CLI tool that aims for a quick enumeration wrapping pentesting tools.☆13Feb 22, 2026Updated last week
- A tool for extracting and filtering URLs, IPs, domains, and subdomains from text or web pages, with built-in web scraping capabilities.☆14Mar 10, 2025Updated 11 months ago
- Control a system remotely via telegram in Powershell☆14Mar 28, 2025Updated 11 months ago
- Web app tool for helping compose advance search operators (aka Google dorking AKA boolean searches) for a variety of search engines☆35May 9, 2023Updated 2 years ago
- A command-line tool for scraping and checking HTTP and SOCKS5 proxies from the checkerproxy.net proxies archive☆44Jan 13, 2026Updated last month
- NmapPy - Python implementation of Nmap☆35Nov 27, 2018Updated 7 years ago
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆35Mar 28, 2023Updated 2 years ago
- KitsuneC2 is a cross-platform adversary emulation tool written in Go.☆12Oct 25, 2024Updated last year
- Yet Another LinkedIn Scraper☆33Mar 9, 2023Updated 2 years ago
- Adversarial Interception Mission Oriented Discovery and Disruption Framework, or AIMOD2, is a structured threat hunting approach to proac…☆90Sep 16, 2023Updated 2 years ago