sneakymonk3y / foxhound-nsmLinks
Foxhound: Blackbox - A Raspberry Pi NSM
☆37Updated 7 years ago
Alternatives and similar repositories for foxhound-nsm
Users that are interested in foxhound-nsm are comparing it to the libraries listed below
Sorting:
- A powershell script for creating a Windows honeyport.☆89Updated 2 months ago
- Modular tool to test exfiltration techniques.☆37Updated 8 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- Plugins to add funtionality to ProcDOT. http://www.procdot.com☆23Updated last year
- Sysmon configuration file template with default high-quality event tracing☆17Updated 4 years ago
- Rogue AP killer☆89Updated 7 years ago
- ☆25Updated 8 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆72Updated 6 years ago
- Scripts that are suited for blue teams☆33Updated 9 years ago
- Schillings SwordPhish empowers organisations and engages its employees to establish the key component of any cyber security strategy: th…☆108Updated 7 years ago
- Windows PowerShell domain scanning tool☆54Updated 9 years ago
- Stop searching for sample hashes on 10 different sites.☆66Updated 7 years ago
- Six Degrees of Domain Admin☆15Updated 7 years ago
- A tool to catch spoofed NBNS responses.☆50Updated 7 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Updated 8 years ago
- Capture passwords of login attempts on non-existent and disabled accounts.☆35Updated 2 years ago
- Cowrie Honeypot Obscurer☆17Updated 4 years ago
- Identify compromised domains or emails. A python based HIBP and HackedEmails wrapper☆38Updated 6 years ago
- Traceroute improved wrapper for CSIRT and CERT operators☆38Updated 8 months ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆66Updated 6 years ago
- Simple website to display the LAN status based on a nmap scan☆58Updated 2 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Updated 8 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆54Updated 7 months ago
- AYY LMAO☆22Updated 9 years ago
- Nessus Vulnerability visualization for the web☆30Updated 9 years ago
- malicious file maker/sender to create and send malicious attachments to test your email filter/alerting☆69Updated 7 years ago
- Lootbox downloads open directories shared on Twitter.☆35Updated 4 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 4 years ago
- This PowerShell script will determine if your connection to external servers over HTTPS is being decrypted by an intercepting proxy such …☆67Updated 7 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago