toolswatch / SSALinks
Open Standard Vulnerability & Compliance Scanner
☆44Updated 9 years ago
Alternatives and similar repositories for SSA
Users that are interested in SSA are comparing it to the libraries listed below
Sorting:
- DPE - Default Password Enumeration☆34Updated 12 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆51Updated 4 years ago
- Perform various SMB-related attacks, particularly useful for testing large Active Directory environments.☆41Updated 2 years ago
- GUI Tool to generate threat intelligence information in various formats☆43Updated 7 years ago
- Automated Security Assessment Reporting Tool☆37Updated 7 years ago
- PowerShell Empire module for logging USB keystrokes via ETW☆31Updated 8 years ago
- Python API for the CVSS v3☆59Updated 4 years ago
- Web application that lets you test if your domain is vulnerable to email spoofing☆35Updated 6 years ago
- ☆52Updated 11 years ago
- Proactive Computer Network Defense Strategy - OSINT Real Time Threat Stream - Social/DarkNet - Data Mining☆32Updated 12 years ago
- Cross platform (i.e., Windows, Linux, Mac) assessment script. The script helps assess workstations for vulnerabilities and abnormalities.☆19Updated 9 years ago
- PHP Phishing Framework☆28Updated 11 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆66Updated 6 years ago
- Pentest ToolKit☆28Updated 5 years ago
- My collection of nmap nse modules☆64Updated 5 years ago
- ☆19Updated 10 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 7 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 7 years ago
- Interactive Post Exploitation Tool☆36Updated 5 years ago
- Honeypot for router backdoor (TCP 32764)☆18Updated 11 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 8 years ago
- 📡 A security research tool with shodan integration☆25Updated 6 years ago
- ssh session type for metasploit☆99Updated 2 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- Search Nmap and Metasploit scanning scripts.☆55Updated 7 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Updated 8 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 9 years ago
- Software exploitation training material☆15Updated 8 years ago
- A collection of curated Java Deserialization Exploits☆10Updated 7 years ago
- Lootbox downloads open directories shared on Twitter.☆35Updated 4 years ago