slandail / cssfLinks
Common Sense Security Framework
☆15Updated 7 years ago
Alternatives and similar repositories for cssf
Users that are interested in cssf are comparing it to the libraries listed below
Sorting:
- ☆51Updated 6 years ago
- A collection of useful scripts for penetration testers☆83Updated 12 years ago
- The initial conversation slides and menu of scenarios☆38Updated 4 years ago
- Comprehensive Pivoting Framework☆20Updated 8 years ago
- Modular tool to test exfiltration techniques.☆37Updated 8 years ago
- Lutech TMS EHAT-NG☆14Updated 8 years ago
- ☆25Updated 8 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- Yara intergrated into BurpSuite☆48Updated 9 years ago
- OpenCV based IDN option generator PoC☆39Updated 8 years ago
- The Intelligent Honey Net Project attempts to create actionable information from honeypots☆62Updated 9 years ago
- Scripts that are suited for blue teams☆33Updated 9 years ago
- Checks observables/ioc in TheHive/Cortex against the MISP warningslists☆14Updated 7 years ago
- Detect malicious domain, Blablablablabla☆26Updated 8 years ago
- Clustering NMAP XML results to help make sense of large scan results.☆33Updated 2 years ago
- mindmap created for tools can be used during analysis/investigation☆27Updated 8 years ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆34Updated 8 years ago
- Git Web Hook Tunnel for C2☆28Updated last year
- DocBleachShell is the integration of the great DocBleach, https://github.com/docbleach/DocBleach Content Disarm and Reconstruction tool i…☆21Updated 3 years ago
- Six Degrees of Domain Admin☆15Updated 7 years ago
- Scoring Engine for CTF competitions☆48Updated 2 years ago
- Automated Memory Forensic☆35Updated 7 years ago
- PowerShell scripts for Hard Drive forensics and parsing Windows Artifacts☆56Updated 4 years ago
- DEPRECATED! LOOK AT CREDNINJA! A tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a …☆15Updated 9 years ago
- Digital Forensics and Incident Response Wiki☆40Updated 11 years ago
- ☆16Updated 8 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Updated 7 years ago
- Cli interface to threatcrowd.org☆19Updated 8 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19Updated 8 years ago
- Tool orchestrator. Specify targets and run sets of tools against them.☆19Updated 9 years ago