Stupid Simple Detection Testing
☆13Mar 7, 2024Updated 2 years ago
Alternatives and similar repositories for SSDT
Users that are interested in SSDT are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- List of netblocks with shared hosting on 20170330☆10Apr 10, 2017Updated 8 years ago
- Convert Nmap output for integration with other Project Discovery tools☆15Apr 2, 2023Updated 2 years ago
- https://academy.tcm-sec.com/☆14Aug 19, 2025Updated 7 months ago
- Project to Support The Hunter's Framework (THF)☆11Apr 16, 2024Updated last year
- ☆14Jan 2, 2025Updated last year
- Knowing which rule should trigger according to the redcannary test☆11Nov 23, 2024Updated last year
- MODBUS Penetration Testing Framework☆11Mar 27, 2019Updated 6 years ago
- Welcome to Autoaudit, a log tampering detection tool.☆13Mar 19, 2024Updated 2 years ago
- ☆19Dec 9, 2024Updated last year
- Easily-guessable Password Generator for Password Spray Attack☆20Jun 4, 2020Updated 5 years ago
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆41Dec 8, 2023Updated 2 years ago
- Hackish nonsense to interact with the MITRE ATT&CK API via Python☆15Feb 2, 2021Updated 5 years ago
- BadExclusions is a tool to identify folder custom or undocumented exclusions on AV/EDR☆21Feb 8, 2024Updated 2 years ago
- ☆124May 12, 2021Updated 4 years ago
- OsintifyX: Powerful Open-source OSINT tool for extracting valuable information from Instagram profiles. OSINT: Instagram Forensics Tool☆11Feb 19, 2024Updated 2 years ago
- ☆27May 6, 2024Updated last year
- moniorg is a tool that leverages crt.sh website to monitor domains of a target☆47Apr 1, 2023Updated 2 years ago
- Local CLI tool for browser extension risk analysis☆27Apr 11, 2025Updated 11 months ago
- sample input data for zq☆15Nov 21, 2025Updated 4 months ago
- ☆18Apr 9, 2024Updated last year
- Collection of antivirus bypass techniques☆13Nov 20, 2023Updated 2 years ago
- A simple rpc2socks alternative in pure Go.☆31Jul 8, 2024Updated last year
- BasicLDR: A Reflective DLL Loader☆14Jun 11, 2024Updated last year
- Just for funsies, virtual foregrounds in Zoom conference calls☆18May 5, 2020Updated 5 years ago
- Extension functionality for the NightHawk operator client☆26Nov 3, 2023Updated 2 years ago
- A tool for finding CNAME of subdomains and checking clickjacking vulnerability.☆13Jun 15, 2025Updated 9 months ago
- Your bloodhound for hidden info in those JS files.☆17May 13, 2024Updated last year
- Anvilogic Forge☆116Sep 18, 2025Updated 6 months ago
- A python script to create a fake GitHub runner and hijack pipeline jobs to leak CI/CD secrets.☆28Oct 13, 2024Updated last year
- GraphQLmap is a scripting engine to interact with a graphql endpoint for pentesting purposes. - Do not use for illegal testing ;)☆15Mar 11, 2024Updated 2 years ago
- Cobalt Strike Beacon Object File (BOF) that uses CredUIPromptForWindowsCredentials API to invoke credential prompt☆23Nov 23, 2022Updated 3 years ago
- Automatic detection engineering technical state compliance☆55Jul 7, 2024Updated last year
- create customized .onion addresses for your hidden service,make shallot and eschalot tools☆13Jan 18, 2022Updated 4 years ago
- go-utils☆12Nov 22, 2025Updated 4 months ago
- A python port of CCob's ThreadlessInject☆25Mar 18, 2023Updated 3 years ago
- Nexus of Android banking Trojans☆15Oct 11, 2023Updated 2 years ago
- OpenID Shared Signals and Events (SSE) / Continuous Access Evaluation Protocol (CAEP) / Risk Incident Sharing and Coordination (RISC) JSO…☆15Jun 7, 2024Updated last year
- A CLI tool for managing Chronicle user workflows☆18Sep 24, 2025Updated 5 months ago
- CLI-based 802.11 Rogue (Fake) AP & Hidden AP Spotter☆14Dec 26, 2025Updated 2 months ago