introduction to distributed scanning using vultr
☆10Apr 29, 2017Updated 8 years ago
Alternatives and similar repositories for DistributedScanning
Users that are interested in DistributedScanning are comparing it to the libraries listed below
Sorting:
- A POC reverse shell that can utilize multiple major web-browsers to provide remote access. Intended to demonstrate remote control of an e…☆13Dec 1, 2016Updated 9 years ago
- dnmap revised (dnmapR) is a modernized and enhanced version of dnmap☆34Jan 22, 2019Updated 7 years ago
- pentest floating repo (based off git submodules), and some useful scripts i wrote☆35Aug 24, 2022Updated 3 years ago
- PHDAYS |||☆17May 23, 2013Updated 12 years ago
- Materials for the BSides NoVA/Charleston 2018 Bro Workshop☆14Jun 4, 2025Updated 9 months ago
- Jupyter Notebooks for Digital Forensics & Incident Response☆10Nov 23, 2021Updated 4 years ago
- Write simple security regression tests for your network infrastructure.☆19Jul 4, 2012Updated 13 years ago
- A repo of fake committed secrets to test tools that find committed secrets ([dont submit for BB :-) ]☆10Mar 22, 2018Updated 7 years ago
- A quick reference guide for python script development in DFIR☆17Mar 20, 2024Updated 2 years ago
- Modules, Scripts, Plugins for the Metasploit Framework☆20May 29, 2011Updated 14 years ago
- Red Team Automation tool powered by go and terraform☆33May 26, 2021Updated 4 years ago
- Cheat sheets☆10Jul 4, 2016Updated 9 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Jan 1, 2020Updated 6 years ago
- A project designed to make the operationalization of open-source cyber threat intelligence more efficient.☆17Updated this week
- This repo is all about Blue teamming and CyberDefenders Write-up for their DFIR challenges☆18Nov 5, 2023Updated 2 years ago
- A guide to setting up Windows and MacOS the way I like it☆22Jun 25, 2025Updated 8 months ago
- Gets currently logged-on users on domain computers, to see if they are local admins or not.☆10Aug 14, 2019Updated 6 years ago
- A tool to parse Firefox and Chrome HSTS databases into forensic artifacts!☆25Jan 8, 2026Updated 2 months ago
- A repo containing some stagers and setup scripts for configuring Salt Stack to be a "bad"-ass C2☆18Jan 3, 2020Updated 6 years ago
- Scans packages in npm and pypi for secrets☆31Nov 4, 2019Updated 6 years ago
- Stealthy DDE Exploit Payload generator and injector for DOCX files☆17May 16, 2018Updated 7 years ago
- Tool orchestrator. Specify targets and run sets of tools against them.☆19Jun 3, 2016Updated 9 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆25Oct 29, 2014Updated 11 years ago
- ☆65May 26, 2016Updated 9 years ago
- An automated way to send phishing emails from Google/G-suite.☆18Nov 30, 2018Updated 7 years ago
- Artefacts from various retefe campaigns☆10Mar 9, 2019Updated 7 years ago
- Forked and updated with some additional features over the original☆17Mar 30, 2021Updated 4 years ago
- Website Comparison Tool☆11May 21, 2021Updated 4 years ago
- In motherland, target network calls you!☆61Sep 4, 2018Updated 7 years ago
- Fast mass dns resolver☆20Jul 23, 2018Updated 7 years ago
- An automation framework for CyberSecurity Tools☆12Dec 6, 2025Updated 3 months ago
- ☆13Nov 3, 2023Updated 2 years ago
- Some talks about security☆12Nov 20, 2020Updated 5 years ago
- A simple demo getting JMX metrics from a docker container☆12Feb 3, 2016Updated 10 years ago
- Convert Wigle.net result from json to Kml☆15Dec 4, 2020Updated 5 years ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆26May 26, 2022Updated 3 years ago
- Scripts that I've written that others may find useful☆14Aug 17, 2022Updated 3 years ago
- Two Proof-Of-Concepts of SUID binary vulnerabilities on BMC Patrol allowing to elevate privileges from any linux user to root.☆12Jun 29, 2020Updated 5 years ago
- Bunch of honey related items that spoof/decoy powersploit functions.☆18Apr 23, 2020Updated 5 years ago