referefref / canarytokendetectorLinks
Detect and remove the presence of canary tokens
☆23Updated last year
Alternatives and similar repositories for canarytokendetector
Users that are interested in canarytokendetector are comparing it to the libraries listed below
Sorting:
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆11Updated last year
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated 2 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆52Updated 2 years ago
- self-hosted Azure OSINT tool☆31Updated 3 months ago
- Configurable, Community driven, HTTP C2 Profile☆26Updated 4 months ago
- AutoPoC Generator HoneyPoC☆35Updated 5 months ago
- RustHunter is a modular incident response framework based on Rust and Ansible to build and compare environmental baselines.☆18Updated 3 years ago
- AWS Testing and Reporting Management Tool☆20Updated 2 years ago
- Tools for offensive security of NetBackup infrastructures☆40Updated 2 years ago
- HashKitty is a user-friendly cross-platform Python wrapper for Hashcat designed to provide an easy password cracking experience for both …☆40Updated last year
- passat - password auditing tool. Does statistical analyses on large sets of cracked passwords.☆26Updated 3 years ago
- GoLang package for creating Mythic Payload Types, C2 Profiles, Translation Services, WebHook listeners, and Loggers☆20Updated this week
- A tool to parse, deduplicate, and query multiple port scans.☆59Updated 2 years ago
- Continuous kerberoast monitor☆45Updated 2 years ago
- python3 scripts to help with aws triage needs☆15Updated 3 years ago
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆22Updated last year
- CIS Benchmark testing of Windows SIEM configuration☆45Updated 2 years ago
- A scanner that files with compromised or untrusted code signing certificates written in python.☆64Updated 2 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Updated 4 years ago
- Files to automatically deploy red team Active Directory test lab☆47Updated 3 years ago
- WMI SA stuffs☆30Updated 3 years ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆14Updated 11 months ago
- Automated Persistence and Lateral Movement using GCP Patch Management☆15Updated 3 years ago
- ☆54Updated 9 months ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆78Updated 2 years ago
- ☆17Updated 8 months ago
- Top hashpwn rules☆21Updated 10 months ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 3 years ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Updated last year