A bunch of scripts used for network defense during competitions.
☆15Apr 3, 2015Updated 10 years ago
Alternatives and similar repositories for BlueTeam
Users that are interested in BlueTeam are comparing it to the libraries listed below
Sorting:
- Simple, useful scripts for red/blue team situations☆22May 4, 2015Updated 10 years ago
- Burp plugin to do random fuzzing of HTTP requests☆33Jan 31, 2017Updated 9 years ago
- golang for http socks5 proxy☆20Jan 16, 2014Updated 12 years ago
- UDP to TCP tunnel for sending datagrams through weak network☆12Jan 31, 2013Updated 13 years ago
- 一个简单的NIDS系统☆15May 17, 2017Updated 8 years ago
- this is a command line (linux, osx) rfc reader☆15Oct 12, 2014Updated 11 years ago
- PowerShell version of Fail2Ban☆13Oct 10, 2019Updated 6 years ago
- DNS TCP to UDP proxy☆10Jul 19, 2015Updated 10 years ago
- Automated Phishing Tool☆11May 27, 2020Updated 5 years ago
- Miscellaneous examples for use with Cobalt Strike Beacon☆10Nov 19, 2020Updated 5 years ago
- A set of compiled application restriction bypasses☆30Mar 15, 2017Updated 9 years ago
- spring mvc cve-2014-3625☆32Mar 11, 2016Updated 10 years ago
- gamebox admin scripts for DEF CON 22~23 CTF Finals☆16Mar 14, 2016Updated 10 years ago
- Struts2の脆弱性S2-045, S2-055 および Jackson の脆弱性 CVE-2017-7525, CVE-2017-15095 の調査報告☆107Dec 13, 2017Updated 8 years ago
- Eagle is a Web Application Attack and Audit Framework. Eagle has moved to Bitbucket.☆11Nov 21, 2016Updated 9 years ago
- Resident (inotify) Anti-Malware Scanner using rules from Linux Malware Detect project☆11Jul 5, 2014Updated 11 years ago
- A repository with various tutorials on how to do things in Pentesting, setup environments and other things☆20Apr 26, 2025Updated 10 months ago
- intel amt honeypot☆18May 9, 2017Updated 8 years ago
- PowerShell Module Bindings for Capstone/Keystone☆25Nov 15, 2016Updated 9 years ago
- htcap is a web application scanner able to crawl single page application (SPA) in a recursive manner by intercepting ajax calls and DOM c…☆18Sep 23, 2025Updated 5 months ago
- ☆22Jun 21, 2022Updated 3 years ago
- web based nmap scan collection and search☆19May 13, 2021Updated 4 years ago
- POC for leaking java version through file and ftp protocols☆24Nov 1, 2020Updated 5 years ago
- configure DNS/proxy for one process execution on Linux 📡☆28Mar 28, 2025Updated 11 months ago
- ☆26Sep 29, 2018Updated 7 years ago
- Transparent proxy that decrypts SSL traffic and prints out IRC messages.☆77Sep 10, 2013Updated 12 years ago
- Automated script for NMAP Scanner with some custom .nse scripts :) for lazy geeks :V☆17Nov 29, 2019Updated 6 years ago
- SOCKS5 proxy library for Go☆29May 30, 2021Updated 4 years ago
- SecurityPaper For www.polaris-lab.com☆104Mar 13, 2019Updated 7 years ago
- This toolkit detects applications vulnerable to DLL hijacking (released in 2010)☆54Oct 16, 2014Updated 11 years ago
- domain for website☆40Dec 21, 2011Updated 14 years ago
- Application for converting speech to text. Speech can either be a live feed or a audio file. This application makes use of google speeech…☆15May 30, 2018Updated 7 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆16Jan 8, 2019Updated 7 years ago
- An adaptive, intelligent XSS fuzzer that learns how the response is reflected and carefully crafts an XSS payload to match☆42Sep 24, 2012Updated 13 years ago
- Burp extension to quickly and easily develop Python complex exploits based on Burp proxy requests.☆32Nov 29, 2015Updated 10 years ago
- C# .Net 5.0 project to build BOF (Beacon Object Files) in mass☆25Jul 25, 2023Updated 2 years ago
- A PowerShell tool for taking screenshots of multiple web servers quickly.☆94Apr 19, 2017Updated 8 years ago
- A Powershell script for signing or adding signatures to tap-windows6 drivers☆10Apr 18, 2019Updated 6 years ago
- 一些漏洞场景的还原,基于https://www.exploit-db.com/☆37Feb 7, 2018Updated 8 years ago