trinitor / netstat2neo4jLinks
create cypher create statements for neo4j out of netstat files from multiple machines
☆41Updated 4 years ago
Alternatives and similar repositories for netstat2neo4j
Users that are interested in netstat2neo4j are comparing it to the libraries listed below
Sorting:
- ☆25Updated 4 years ago
- A CLI tool for querying passive DNS services☆41Updated last year
- Interactive Post Exploitation Tool☆37Updated 5 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Updated 6 years ago
- Automate SSH communication with firewalls, switches, etc.☆26Updated 7 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 4 years ago
- Cyberdelia, a Collection of Command and Control frameworks☆64Updated 5 years ago
- Network assessment tool for various UDP Services covering both IPv4 and IPv6 protocols☆115Updated 5 years ago
- Real Time Threat Monitoring Tool☆112Updated 2 years ago
- Simple development DNS server written in python☆26Updated 7 years ago
- A framework to generate unique test cases based on code snippets to test techniques☆55Updated 4 years ago
- Python script to detect bluekeep vulnerability (CVE-2019-0708) with TLS/SSL and x509 support☆27Updated 6 years ago
- Endpoint for Out-of-Band Exfiltration (DNS & HTTP)☆92Updated 6 years ago
- Automate common Chrome Debug Protocol tasks to help debug web applications from the command-line and actively monitor and intercept HTTP …☆73Updated 4 years ago
- hassh-utils: Nmap NSE Script and Docker image for HASSH - the SSH client/server fingerprinting method (https://github.com/salesforce/hass…☆60Updated 11 months ago
- Burp Commander written in Go☆57Updated 6 years ago
- ArmourBird CSF - Container Security Framework☆44Updated 3 years ago
- WhiteBox CMS analysis☆69Updated 2 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Updated 7 years ago
- Sysmon config for both Windows and Linux Devices. Windows one is a bit dated☆56Updated last year
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Updated 2 years ago
- Very crude and poorly written HTTP(s) and SMTP bin☆93Updated 4 years ago
- Community-based integrated malware identification system☆82Updated 2 years ago
- Checklist and tools for increasing security of Apache Airflow☆32Updated 4 years ago
- ☆58Updated 5 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 7 years ago
- SilkETW & SilkService☆40Updated 6 years ago
- Post Exploitation agent which uses a browser to do C2 operations.☆102Updated 7 years ago
- Encima De la Mosca HTTP proxy POC for infecting files on-the-fly and SSLstrip2☆41Updated 7 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 7 years ago