syphon1c / drackerLinks
Document tracing and tracking. Dracker lets you "tag" documents with a phone home call when MS Word documents are opened. This application can be used as a honey pot to detect when "users" have opened "honey" docuements in shares they should not have accessed, or it allows you to track sensitive confidential documents within the organisation to …
☆14Updated 11 years ago
Alternatives and similar repositories for dracker
Users that are interested in dracker are comparing it to the libraries listed below
Sorting:
- Identify compromised domains or emails. A python based HIBP and HackedEmails wrapper☆38Updated 7 years ago
- ☆25Updated 9 years ago
- This PowerShell script will determine if your connection to external servers over HTTPS is being decrypted by an intercepting proxy such …☆67Updated 7 years ago
- Speeds up the extraction of password hashes from ntds.dit files. For use with the ntdsxtract project or the dshash script☆27Updated last year
- Security Operations Center Multiple Purpose Tool, takes IP address input, conducts OSINT, conducts splunk, bro, fireeye, imperva, and fir…☆21Updated 8 years ago
- malicious file maker/sender to create and send malicious attachments to test your email filter/alerting☆70Updated 8 years ago
- Schillings SwordPhish empowers organisations and engages its employees to establish the key component of any cyber security strategy: th…☆105Updated 7 years ago
- A collection of useful scripts☆24Updated 7 years ago
- A tool to catch spoofed NBNS responses.☆51Updated 7 years ago
- ☆61Updated 7 years ago
- The initial conversation slides and menu of scenarios☆38Updated 4 years ago
- A tool for importing vulnerability scanner data and then allowing you to manipulate the risks, affected hosts, and create risk ordered ou…☆80Updated last year
- The documents☆56Updated 8 years ago
- Comprehensive Pivoting Framework☆20Updated 9 years ago
- Pillage is a multithreaded enumeration python script I created for the enumeration phase of penetration tests.☆26Updated 8 years ago
- A finder of domain typos showing country of IP address☆166Updated 2 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Updated 7 years ago
- A powershell script that prints a lot of IP and connection info to the screen☆31Updated 8 years ago
- OpenCV based IDN option generator PoC☆39Updated 8 years ago
- Quick python script to automatically load NTLM hashes from Responder logs and fires up Hashcat to crack them☆80Updated 10 years ago
- SMB Auto authentication Vulnerability☆34Updated 9 years ago
- Automated Cisco SNMP Enumeration, Brute Force, Configuration Download and Password Cracking☆19Updated 9 years ago
- CloudBurst is a red team framework for interacting with cloud providers to capture, compromise, and exfil data.☆37Updated 7 years ago
- Queries to parse sysmon event log file with microsoft logparser☆58Updated 10 years ago
- Anti-Honeypot Demo (obsolete)☆18Updated 8 years ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Updated 7 years ago
- ☆53Updated 7 years ago
- Capture passwords of login attempts on non-existent and disabled accounts.☆37Updated 3 years ago
- Windows PowerShell domain scanning tool☆54Updated 9 years ago
- This script runs several security checks and makes modifications (with your permission) to your Active Directory domain to improve it's s…☆45Updated 9 years ago