Linux Security and Monitoring Scripts
☆328Sep 27, 2025Updated 5 months ago
Alternatives and similar repositories for LSMS
Users that are interested in LSMS are comparing it to the libraries listed below
Sorting:
- CIS Benchmark testing of Windows SIEM configuration☆45May 25, 2023Updated 2 years ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146May 31, 2024Updated last year
- An XSS Exploitation Tool☆338Dec 5, 2025Updated 3 months ago
- Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase.☆784Jun 23, 2023Updated 2 years ago
- PowerShell Script Analyzer☆69Oct 26, 2023Updated 2 years ago
- Dump place details from Google Maps like phone,email,website,and reviews☆73Jun 3, 2025Updated 9 months ago
- APK Infrastructure Investigator☆64Jun 20, 2023Updated 2 years ago
- Kubernetes exploitation tool☆363Feb 25, 2026Updated last week
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆29Aug 13, 2023Updated 2 years ago
- Volatility 3 plugins to extract a module as complete as possible☆12Jun 13, 2023Updated 2 years ago
- Wireshark RDP resources☆221Jun 2, 2025Updated 9 months ago
- DNSleuth sniffs DNS packets, i.e, allowing you to spy on the DNS queries your machine is making☆102Aug 9, 2023Updated 2 years ago
- An OSINT tool tailored for comprehensive collection, analysis, and interpretation of cyber threat intelligence from Telegram channels and…☆106Apr 21, 2024Updated last year
- A fuzzer for finding anomalies and analyzing how servers respond to different HTTP headers☆356Dec 14, 2023Updated 2 years ago
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆483Oct 14, 2022Updated 3 years ago
- Unfixed Windows PowerShell Filename Code Execution POC☆41Dec 26, 2023Updated 2 years ago
- Configuration Extractor for BlackCat Ransomware☆31Mar 18, 2022Updated 3 years ago
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!☆978Jan 12, 2024Updated 2 years ago
- Free training course offered at Hack Space Con 2023☆138Apr 13, 2023Updated 2 years ago
- APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the …☆1,402Nov 7, 2024Updated last year
- WELA (Windows Event Log Analyzer): The Swiss Army knife for Windows Event Logs! ゑ羅(ウェラ)☆779Feb 3, 2023Updated 3 years ago
- A PoC ransomware sample to test out your ransomware response strategy.☆212Feb 10, 2026Updated 3 weeks ago
- WMEye is a post exploitation tool that uses WMI Event Filter and MSBuild Execution for lateral movement☆369Dec 24, 2021Updated 4 years ago
- Unpacking tool for the zipExec Crypter☆14Oct 30, 2021Updated 4 years ago
- A suite of tools to disrupt campaigns using the Sliver C2 framework.☆282Aug 5, 2023Updated 2 years ago
- ☆80Apr 18, 2023Updated 2 years ago
- A simple command line tool which quickly audits the Disallow entries of a site's robots.txt.☆23Apr 5, 2023Updated 2 years ago
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,156Updated this week
- Course repository for PowerShell for Pentesters Course☆439Mar 9, 2022Updated 3 years ago
- Extract C2 Traffic☆253Nov 25, 2024Updated last year
- A fast enumeration tool for Windows Active Directory Pentesting written in Go☆278Jan 14, 2023Updated 3 years ago
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆26Jul 14, 2024Updated last year
- FalconHound is a blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more automated fashion. It is de…☆816Feb 17, 2025Updated last year
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆41Nov 12, 2023Updated 2 years ago
- Linux Evidence Acquisition Framework☆119Sep 30, 2024Updated last year
- MrKaplan is a tool aimed to help red teamers to stay hidden by clearing evidence of execution.☆270Sep 26, 2023Updated 2 years ago
- Search WiFi geolocation data by BSSID and SSID on different public databases.☆1,208Dec 21, 2024Updated last year
- A command-line utility designed to recursively spider webpages for URLs. It works by actively traversing websites - following links embed…☆104Dec 8, 2025Updated 2 months ago
- An open-source self-hosted purple team management web application.☆304Feb 15, 2026Updated 2 weeks ago