Files related to our research on ShadowHammer
☆23Jun 11, 2021Updated 4 years ago
Alternatives and similar repositories for shadowhammer
Users that are interested in shadowhammer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Website searcher for SEO comparisons / OSINT☆11Oct 13, 2019Updated 6 years ago
- ASERT shared scripts for reversing☆32Feb 5, 2018Updated 8 years ago
- Splunk App for MITRE Att&CK Navigator(TM)☆23Mar 25, 2021Updated 5 years ago
- A very simple but useful bot for scrapping users from instagram. It scrapes every single follower, following, and post. Not just that, it…☆13May 30, 2022Updated 3 years ago
- An email client in CLI, designed specifically for spearphishing.☆13Jul 25, 2019Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Basic app to practice modsec bypass☆22May 12, 2016Updated 10 years ago
- Windows PowerShell enumeration toolset for analyzing system configurations.☆22Apr 30, 2019Updated 7 years ago
- Integration of fluent-bit and Splunk using the HTTP Event Collector (Splunk HEC)☆10Oct 16, 2018Updated 7 years ago
- Splunk app to support presentation at .conf2015 on free security tools and Splunk☆10Sep 24, 2015Updated 10 years ago
- 日前我发现了D-Link DIR 880L/865L/868L/860L路由器存在多个XSS和命令注入漏洞,最主要的问题是路由器未对用户输入进行检查,导致恶意数据请求被执行,最终被远程攻击者控制整个设备。☆11Mar 2, 2018Updated 8 years ago
- ☆19May 31, 2017Updated 8 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Mar 21, 2019Updated 7 years ago
- Heart-shaped flashlight PCB for Ariella☆15Sep 2, 2017Updated 8 years ago
- A scan of all .gov.uk sites for the most common security headers or lack of☆15Updated this week
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- This app leverages the Adaptive Response framework to perform API calls to Security Trails☆16Feb 14, 2019Updated 7 years ago
- Python library for managing malware feeds and blacklists published online by third parties.☆10Nov 13, 2015Updated 10 years ago
- CVE-2021-21972☆33Mar 1, 2021Updated 5 years ago
- A Splunker’s guide to containers☆12Dec 21, 2019Updated 6 years ago
- Framework that sits on top of Splunk Enterprise Security to do auto-mitigation☆14Dec 29, 2014Updated 11 years ago
- ☆16Apr 16, 2017Updated 9 years ago
- Sysmon config for both Windows and Linux Devices. Windows one is a bit dated☆55Jul 10, 2024Updated last year
- Malleable C2 profiles for Cobalt Strike☆77Sep 9, 2022Updated 3 years ago
- The Dragonfly badge as seen at DEFCON26☆21Aug 12, 2018Updated 7 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- create docset for Dash (http://kapeli.com/dash) with splunk search language☆15Sep 26, 2017Updated 8 years ago
- Fluentd input plugin which queries Kubernetes kubelet summary API to collect Kubernetes metrics.☆12Jun 25, 2025Updated 10 months ago
- CLI application to analyse Security Headers from a given URL using securityheaders.io☆19Jul 2, 2020Updated 5 years ago
- This is just a dumping ground for metasploit modules that I've worked on or am working on. Some have been submitted to Rapid7 and some h…☆17Jan 25, 2016Updated 10 years ago
- The Mac app that automatically sets your desktop background to pictures from Reddit☆11May 20, 2020Updated 6 years ago
- The initial conversation slides and menu of scenarios☆38Jun 13, 2021Updated 4 years ago
- Indices for courses in SANS' Network Security Operations curriculum☆17Feb 5, 2016Updated 10 years ago
- Real-time dashboards, graphs, and analytics for Philadelphia's Regional Rail train system.☆15May 14, 2026Updated last week
- Some simple and useful tools☆15May 8, 2018Updated 8 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆25Aug 14, 2025Updated 9 months ago
- OpenShiftEnterprise3_Demo☆12Aug 30, 2018Updated 7 years ago
- ☆27May 27, 2016Updated 9 years ago
- Move frozen buckets to AWS S3 (and ultimately Glacier) for long term storage☆13Sep 28, 2017Updated 8 years ago
- NTPD remote DOS exploit and vulnerable container☆25Oct 30, 2017Updated 8 years ago
- This project contains code for comparing or ranking APT capabilities and operational capacity. The metrics are meant to quantify, rank, o…☆35Feb 27, 2019Updated 7 years ago
- D-Scan project for office document analysis and generating flow diagram of macro in documents. For demo visit☆29Jan 10, 2026Updated 4 months ago