☆34May 24, 2023Updated 2 years ago
Alternatives and similar repositories for Automatic-Intelligence-feed
Users that are interested in Automatic-Intelligence-feed are comparing it to the libraries listed below
Sorting:
- This script is to build Wazuh 4.3 environment☆11May 30, 2022Updated 3 years ago
- Script to download and decrypt memories and MEO from Snapchat on IOS. Requires the keys for memories to be present in the keychain, as we…☆15Oct 31, 2022Updated 3 years ago
- Create a cool process tree like https://twitter.com/ACEResponder.☆35Mar 1, 2023Updated 3 years ago
- Vulnerable web site. Used to test sentinel features.☆11Nov 18, 2016Updated 9 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- ☆18Aug 31, 2023Updated 2 years ago
- multi-threaded script uses VirusTotal and AbuseIPDB APIs and generate an excel with all needed data☆10Mar 14, 2023Updated 3 years ago
- A Red Team Script to Detect Canary Tokens and Seed Files☆15Jan 2, 2024Updated 2 years ago
- Collection of Tools & Techniques for analyzing URLs☆33Oct 1, 2023Updated 2 years ago
- ☆20Oct 16, 2019Updated 6 years ago
- List of Command&Control (C2) software☆50Nov 11, 2022Updated 3 years ago
- My backdoor script for a vulnerable version of UnrealIRCd☆25Apr 29, 2024Updated last year
- Short and simple vulnerable PHP web application that naïve scanners found to be perfectly safe☆14Dec 4, 2015Updated 10 years ago
- A threat sighting collects the behavior of a real threats and the observables used during its engagement.☆12Mar 29, 2022Updated 3 years ago
- ☆120May 26, 2025Updated 9 months ago
- A PowerShell script for Windows security checks, covering Windows Defender, firewall, UAC, updates, BitLocker, network sharing, PowerShel…☆24Aug 2, 2025Updated 7 months ago
- 🚀 ORedirectMe is a robust and efficient tool designed to detect Open Redirect vulnerabilities in web applications.☆17Dec 23, 2024Updated last year
- Template project for Offensive Security Exam Documentation☆11Feb 25, 2020Updated 6 years ago
- A network logging tool that logs per process activities☆32Jun 13, 2023Updated 2 years ago
- ☆49Oct 28, 2022Updated 3 years ago
- This is automation tool which utilize 2 sub -domain finder and then sort out working sub-domain and finally scan for sub-doamin TAKEOVER.☆11May 6, 2023Updated 2 years ago
- Ivanti Pulse Secure CVE-2023-46805 Scanner - Based on Assetnote's Research☆13Jan 19, 2024Updated 2 years ago
- Abusing Remote Windows SMB Shares for Fun and Pen Testing☆15May 23, 2023Updated 2 years ago
- visually see issues with supported cipher suites☆18Jun 18, 2024Updated last year
- WARF is a Web Application Reconnaissance Framework that helps to gather information about the target.☆193Dec 27, 2022Updated 3 years ago
- General Content☆27Dec 23, 2025Updated 2 months ago
- Tutorial session from PyData London, Fri 6 May 2016☆11May 6, 2016Updated 9 years ago
- DNS logging, detection, ...☆15Mar 5, 2022Updated 4 years ago
- A powershell script for creating a Windows honeyport.☆12Jun 24, 2015Updated 10 years ago
- Jenkins Security Research or Hacking Jenkins ;)☆12Dec 10, 2024Updated last year
- A triage data collection script for macOS☆29Nov 27, 2020Updated 5 years ago
- My experiences with Virtual Hacking Labs☆12Feb 7, 2020Updated 6 years ago
- ☆29Mar 2, 2023Updated 3 years ago
- Automatically perform advanced NTLM hash relay attacks☆15Nov 4, 2022Updated 3 years ago
- Visual Studio (C++) Solution Template for Payloads☆18Oct 30, 2019Updated 6 years ago
- Menu for Thor scanner lite☆20Oct 24, 2025Updated 4 months ago
- Modular malware analysis artifact collection and correlation framework☆54Apr 23, 2024Updated last year
- Bypass AMSI By Dividing files into multiple smaller files☆46Dec 12, 2022Updated 3 years ago
- Unauthenticated Remote Code Execution in SPIP versions up to and including 4.2.12☆13Aug 12, 2024Updated last year