☆34May 24, 2023Updated 2 years ago
Alternatives and similar repositories for Automatic-Intelligence-feed
Users that are interested in Automatic-Intelligence-feed are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This script is to build Wazuh 4.3 environment☆12May 30, 2022Updated 3 years ago
- Create a cool process tree like https://twitter.com/ACEResponder.☆35Mar 1, 2023Updated 3 years ago
- Vulnerable web site. Used to test sentinel features.☆11Nov 18, 2016Updated 9 years ago
- ☆18Aug 31, 2023Updated 2 years ago
- nistrich allows you to discover CVEs and their severities belong to IP addresses☆13Dec 28, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- multi-threaded script uses VirusTotal and AbuseIPDB APIs and generate an excel with all needed data☆10Mar 14, 2023Updated 3 years ago
- A Red Team Script to Detect Canary Tokens and Seed Files☆16Jan 2, 2024Updated 2 years ago
- Collection of Tools & Techniques for analyzing URLs☆33Oct 1, 2023Updated 2 years ago
- This vulnerability could allow an attacker to take complete control of a vulnerable Confluence server. This could allow the attacker to s…☆11May 24, 2024Updated last year
- ☆20Oct 16, 2019Updated 6 years ago
- H&E- Burp Highlighter and Extractor☆18Mar 29, 2023Updated 3 years ago
- List of Command&Control (C2) software☆50Nov 11, 2022Updated 3 years ago
- My backdoor script for a vulnerable version of UnrealIRCd☆25Apr 29, 2024Updated 2 years ago
- Short and simple vulnerable PHP web application that naïve scanners found to be perfectly safe☆14Dec 4, 2015Updated 10 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- 🚀 ORedirectMe is a robust and efficient tool designed to detect Open Redirect vulnerabilities in web applications.☆17Mar 24, 2026Updated last month
- A threat sighting collects the behavior of a real threats and the observables used during its engagement.☆12Mar 29, 2022Updated 4 years ago
- ☆121May 26, 2025Updated 11 months ago
- A PowerShell script for Windows security checks, covering Windows Defender, firewall, UAC, updates, BitLocker, network sharing, PowerShel…☆27Aug 2, 2025Updated 9 months ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆36Jan 20, 2022Updated 4 years ago
- Template project for Offensive Security Exam Documentation☆12Feb 25, 2020Updated 6 years ago
- PoC☆12Apr 7, 2025Updated last year
- A network logging tool that logs per process activities☆32Jun 13, 2023Updated 2 years ago
- ☆49Oct 28, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A small utility and interface for renaming files using the Unicode Right-To-Left Override attack☆10Feb 16, 2016Updated 10 years ago
- ☆24Jan 24, 2025Updated last year
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆69Mar 17, 2024Updated 2 years ago
- Ivanti Pulse Secure CVE-2023-46805 Scanner - Based on Assetnote's Research☆13Jan 19, 2024Updated 2 years ago
- Abusing Remote Windows SMB Shares for Fun and Pen Testing☆15May 23, 2023Updated 2 years ago
- WARF is a Web Application Reconnaissance Framework that helps to gather information about the target.☆193Dec 27, 2022Updated 3 years ago
- My dotfiles for Windows boxes☆31Apr 18, 2026Updated last month
- General Content☆27Dec 23, 2025Updated 4 months ago
- A triage data collection script for macOS☆30Nov 27, 2020Updated 5 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A powershell script for creating a Windows honeyport.☆12Jun 24, 2015Updated 10 years ago
- My experiences with Virtual Hacking Labs☆12Feb 7, 2020Updated 6 years ago
- Brute Ratel LDAP filtering and sorting tool. Easily take BR log output and pull hostnames for ease of use with other red team tooling. Su…☆39Nov 16, 2023Updated 2 years ago
- Automatically perform advanced NTLM hash relay attacks☆15Nov 4, 2022Updated 3 years ago
- Menu for Thor scanner lite☆20Oct 24, 2025Updated 6 months ago
- Volatility plugin to search for all Autostart Extensibility Points (AESPs)☆10May 16, 2024Updated 2 years ago
- Modular malware analysis artifact collection and correlation framework☆56Apr 23, 2024Updated 2 years ago