trinitor / netstat2neo4jLinks
create cypher create statements for neo4j out of netstat files from multiple machines
☆41Updated 4 years ago
Alternatives and similar repositories for netstat2neo4j
Users that are interested in netstat2neo4j are comparing it to the libraries listed below
Sorting:
- Interactive Post Exploitation Tool☆37Updated 5 years ago
- ☆25Updated 4 years ago
- A CLI tool for querying passive DNS services☆41Updated last year
- POC for utilizing wikipedia API for Command and Control☆29Updated 2 years ago
- A framework to generate unique test cases based on code snippets to test techniques☆55Updated 4 years ago
- Checklist and tools for increasing security of Apache Airflow☆32Updated 4 years ago
- The SSH Multiplex Backdoor Tool☆63Updated 5 years ago
- web based nmap scan collection and search☆19Updated 4 years ago
- Netbyte is a Netcat-style tool that facilitates probing proprietary TCP and UDP services. It is lightweight, fully interactive and provid…☆62Updated 7 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Updated 6 years ago
- Golang based web service to scan files with yara rules☆26Updated 8 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 4 years ago
- A simple, quick, and dirty websocket shell for PowerShell.☆20Updated 8 years ago
- Perform various SMB-related attacks, particularly useful for testing large Active Directory environments.☆41Updated 2 years ago
- Automate SSH communication with firewalls, switches, etc.☆26Updated 7 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- Enumerate S3 buckets via certstream, domain, or keywords☆15Updated 7 years ago
- This is a concept poc of command and control server implemented over blockchain☆52Updated 5 years ago
- Burp Commander written in Go☆58Updated 6 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆30Updated 6 years ago
- Proof-of-Concept exploits for CVE-2017-11882☆42Updated 7 years ago
- Vulnerability consolidation and management tool, enhances scan results by merging different findings of the same weakness across multiple…☆24Updated 2 years ago
- Oracle Attacks Tool☆13Updated 8 years ago
- IDS/IPS malware download evasion☆15Updated 6 years ago
- ☆1Updated 6 years ago
- A simple grep user interface for searching code which can be used for SAST.☆8Updated 5 years ago
- ☆19Updated 8 years ago
- A tool for fuzzing for ports that allow outgoing connections☆18Updated 6 years ago
- A PoC that shows that Web Vulnerabilities can indeed be interesting☆20Updated 7 years ago
- Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests☆21Updated 8 years ago