Security Assessment Report geNerated Automatically
☆42Sep 26, 2024Updated last year
Alternatives and similar repositories for sarna
Users that are interested in sarna are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆14Oct 25, 2019Updated 6 years ago
- Funter (Forms Hunter) is a tool that hunts all forms and inputs found in a list of urls.☆19Jul 1, 2023Updated 2 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆26Apr 13, 2020Updated 5 years ago
- ansible roles to download and install empire (BC-Security),deathstar(byt3bl33der) and starkiller (BC-Security)☆24May 8, 2022Updated 3 years ago
- Get random bytes from the TPM (tool + BCrypt RNG provider)☆17Nov 3, 2020Updated 5 years ago
- ☆37Apr 30, 2020Updated 5 years ago
- FARO - Document Sensitivity Detector☆10Sep 30, 2022Updated 3 years ago
- Uncover usage of insecure functions, implementation of weak cryptography, encryption status, and the presence of security features like P…☆32Oct 3, 2025Updated 5 months ago
- Hackers Don't Give A Shit☆16Feb 2, 2020Updated 6 years ago
- Takes a software bill of materials and outputs provenance, and activity data from trustypkg.dev☆10May 19, 2025Updated 10 months ago
- Leak windows system info through a docx file☆12Feb 23, 2020Updated 6 years ago
- HP Data Protector Arbitrary Remote Command Execution☆11Aug 12, 2018Updated 7 years ago
- This is a 64 bit VBA implementation of Christophe Tafani-Dereeper's original VBA code described in his blog @ https://blog.christophetd.f…☆21Feb 2, 2020Updated 6 years ago
- Build a domain with three quick PowerShell scripts!☆29Jun 3, 2020Updated 5 years ago
- ☆50Sep 20, 2022Updated 3 years ago
- A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo…☆20Aug 29, 2022Updated 3 years ago
- Proof-of-concept for phishing intelligence in Elastic☆15Apr 30, 2019Updated 6 years ago
- Resources for I Want My EIP, presented at Derbycon 2017☆11Sep 23, 2017Updated 8 years ago
- Small and highly portable detection tests.☆13Apr 13, 2018Updated 7 years ago
- Script to extract a signature of the first blocks of the disk, to be able to dectect boot tampering attemps.☆10Jul 8, 2016Updated 9 years ago
- LetMeOutOfYour.net Resources☆21Jul 15, 2020Updated 5 years ago
- A cover story generator for people who Need Quick Covers On Operations☆13May 17, 2020Updated 5 years ago
- BloodHound Cypher Queries Ported to a Jupyter Notebook☆53Jun 20, 2020Updated 5 years ago
- FARO - Document Sensitivity Detector☆11Feb 8, 2021Updated 5 years ago
- See adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)☆108Feb 12, 2023Updated 3 years ago
- Easily-guessable Password Generator for Password Spray Attack☆20Jun 4, 2020Updated 5 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆46Dec 20, 2020Updated 5 years ago
- An obfuscated file system that stores files and directories on Twitter. (Proof of concept.)☆27Sep 6, 2011Updated 14 years ago
- Collaborative pentest tool with highly customizable tools☆73Jan 6, 2022Updated 4 years ago
- Analizador de tráfico para dispositivos Android potencialmente comprometidos como parte de una botnet orientado a detectar ataques DDoS.☆13Jun 20, 2018Updated 7 years ago
- Extract domains/subdomains/FQDNs from files and URLs☆19Jun 30, 2020Updated 5 years ago
- Bicep examples repo for log analytics, azure monitor and sentinel☆26Mar 16, 2023Updated 3 years ago
- Ansible scripts to build an attack box☆24Sep 24, 2018Updated 7 years ago
- Burp Extender plugin that generates a sitemap of a website using Wayback Machine☆12Jun 18, 2018Updated 7 years ago
- Utility to enumerate users, groups and computers from a Windows domain through LDAP queries☆394Mar 25, 2021Updated 4 years ago
- PSAttck is a light-weight framework for the MITRE ATT&CK Framework.☆38Jan 11, 2022Updated 4 years ago
- A WLAN red team framework.☆159Feb 9, 2026Updated last month
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆48Oct 27, 2023Updated 2 years ago
- Damn Simple Vulnerable Python Web Application☆18Jun 5, 2024Updated last year