skalkoto / winexe
☆69Updated 6 years ago
Related projects: ⓘ
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆104Updated 9 years ago
- This python based milter (mail-filter) checks an incoming mail for suspicious VBA macro code in MS 20xx Office attachments (doc, xls, ppt…☆37Updated 3 years ago
- The Official Github Repository of Daemonlogger☆19Updated 3 years ago
- Linux Automatic ARP (TCP / UDP / ICMP) Firewall☆79Updated 4 years ago
- Wi-Fi Scan Visualizer by Pentester Academy☆54Updated 9 years ago
- Kerberos / Windows AD / Linux PAM password change check against breached lists (HIBP), and other rules☆158Updated last year
- Perl script to bruteforce SSH known_hosts files.☆25Updated 9 years ago
- A powershell script for creating a Windows honeyport.☆87Updated 8 years ago
- Smart Install Client Scanner☆61Updated 4 years ago
- A Simple QUEry and Report Tool☆142Updated 5 years ago
- unix wildcard attacks☆130Updated 6 years ago
- Easy 802.1Q VLAN Hopping☆79Updated last month
- Application Layer IDS/IPS with iptables☆73Updated 5 years ago
- Nix Audit made easier (RHEL, CentOS)☆66Updated 3 years ago
- Replay RDP traffic from PCAP☆182Updated 5 years ago
- Smoking Linux Every Day!☆54Updated 4 years ago
- The User Interface for GoCrack☆83Updated last week
- ☆84Updated this week
- TFTP Theft is a tool which allows one to quickly scan/bruteforce a tftp server for files and download them instantly☆67Updated 8 years ago
- Extract all forensic interesting information of Firefox, Iceweasel and Seamonkey browsers☆128Updated 3 years ago
- Parse nmap scan data with Perl (official repo)☆36Updated 5 years ago
- This is the Lynis Software Development Kit (SDK), to help creating custom tests and improve code quality.☆52Updated 6 months ago
- A tool to generate graph and other output from NMAP XML files☆113Updated 5 years ago
- Indicators of Compromise (IOCs) for malware we have researched☆10Updated last year
- Visual Basic GUI: A Tool to Inject Keystrokes on a SSH Client via an X11 Forwarded Session☆63Updated 6 years ago
- Active Directory Group Policy analyzer☆94Updated 10 years ago
- Snort rules to detect local malware, phishing, and adult content by inspecting DNS responses from OpenDNS☆52Updated 8 years ago
- This is a simple parser for/decrypter for Impacket's esentutl.py utility. It assists with decrypting hashes and hash histories from ntds.…☆70Updated 7 years ago
- Spacebin is a proof-of-concept malware that exfiltrates data (from No Direct Internet Access environments) via triggering AV on the endpo…☆84Updated 7 years ago
- disable LD_PRELOAD on linux☆19Updated 8 years ago