Linux Security and Monitoring Scripts
☆329Sep 27, 2025Updated 7 months ago
Alternatives and similar repositories for LSMS
Users that are interested in LSMS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CIS Benchmark testing of Windows SIEM configuration☆45May 25, 2023Updated 2 years ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146May 31, 2024Updated last year
- Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase.☆783Jun 23, 2023Updated 2 years ago
- An XSS Exploitation Tool☆340Dec 5, 2025Updated 5 months ago
- Dump place details from Google Maps like phone,email,website,and reviews☆73Jun 3, 2025Updated 11 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆30Aug 13, 2023Updated 2 years ago
- Kubernetes exploitation tool☆365Feb 25, 2026Updated 2 months ago
- Unpacking tool for the zipExec Crypter☆14Oct 30, 2021Updated 4 years ago
- Configuration Extractor for BlackCat Ransomware☆31Mar 18, 2022Updated 4 years ago
- An OSINT tool tailored for comprehensive collection, analysis, and interpretation of cyber threat intelligence from Telegram channels and…☆106Apr 21, 2024Updated 2 years ago
- PowerShell Script Analyzer☆68Oct 26, 2023Updated 2 years ago
- Free training course offered at Hack Space Con 2023☆138Apr 13, 2023Updated 3 years ago
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆485Oct 14, 2022Updated 3 years ago
- APK Infrastructure Investigator☆64Jun 20, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- DNSleuth sniffs DNS packets, i.e, allowing you to spy on the DNS queries your machine is making☆102Aug 9, 2023Updated 2 years ago
- Wireshark RDP resources☆221Jun 2, 2025Updated 11 months ago
- ☆470Nov 20, 2024Updated last year
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆679Feb 17, 2026Updated 2 months ago
- FalconHound is a blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more automated fashion. It is de…☆821Apr 18, 2026Updated 2 weeks ago
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!☆1,076Mar 24, 2026Updated last month
- ☆80Apr 18, 2023Updated 3 years ago
- APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the …☆1,408Nov 7, 2024Updated last year
- Unfixed Windows PowerShell Filename Code Execution POC☆41Dec 26, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Windows Oracle Database Attack Toolkit☆81Jul 30, 2022Updated 3 years ago
- WMEye is a post exploitation tool that uses WMI Event Filter and MSBuild Execution for lateral movement☆373Dec 24, 2021Updated 4 years ago
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,175Apr 30, 2026Updated last week
- Everything related to Linux Forensics☆719Jul 13, 2023Updated 2 years ago
- Course repository for PowerShell for Pentesters Course☆441Mar 9, 2022Updated 4 years ago
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆130Sep 24, 2023Updated 2 years ago
- Practical Windows Forensics Training☆763Feb 16, 2026Updated 2 months ago
- A PoC ransomware sample to test out your ransomware response strategy.☆211Feb 10, 2026Updated 2 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- WELA (Windows Event Log Analyzer): The Swiss Army knife for Windows Event Logs! ゑ羅(ウェラ)☆778Feb 3, 2023Updated 3 years ago
- Malwoverview is a first response tool for threat hunting across VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, M…☆3,768Apr 16, 2026Updated 3 weeks ago
- Extract C2 Traffic☆254Nov 25, 2024Updated last year
- Finding secrets in kernel and user memory☆117Sep 6, 2023Updated 2 years ago
- A fuzzer for finding anomalies and analyzing how servers respond to different HTTP headers☆357Dec 14, 2023Updated 2 years ago
- ScrapPY is a Python utility for scraping manuals, documents, and other sensitive PDFs to generate wordlists that can be utilized by offen…☆223May 2, 2025Updated last year
- A suite of tools to disrupt campaigns using the Sliver C2 framework.☆283Aug 5, 2023Updated 2 years ago