trinitor / netstat2neo4j
create cypher create statements for neo4j out of netstat files from multiple machines
☆41Updated 4 years ago
Alternatives and similar repositories for netstat2neo4j
Users that are interested in netstat2neo4j are comparing it to the libraries listed below
Sorting:
- ☆25Updated 4 years ago
- A CLI tool for querying passive DNS services☆41Updated last year
- Interactive Post Exploitation Tool☆36Updated 5 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Updated 6 years ago
- Network assessment tool for various UDP Services covering both IPv4 and IPv6 protocols☆115Updated 5 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 3 years ago
- Scan for and exploit Consul agents☆40Updated 5 years ago
- Python parser for Red Canary's Atomic Red Team Yamls☆27Updated 6 years ago
- Golang based web service to scan files with yara rules☆27Updated 7 years ago
- Automate common Chrome Debug Protocol tasks to help debug web applications from the command-line and actively monitor and intercept HTTP …☆73Updated 3 years ago
- A framework for automating penetration testing using a plugin based architecture☆38Updated 2 years ago
- Burp Commander written in Go☆58Updated 6 years ago
- POC for utilizing wikipedia API for Command and Control☆29Updated 2 years ago
- DNS server limitation mapper☆26Updated 6 years ago
- Docker image for PowerShell remoting from Linux to Windows☆36Updated 6 years ago
- Pulse Secure SSL VPN pre-auth file reading☆50Updated 5 years ago
- My attempt at writing exploit POCs for various CVEs☆16Updated 5 years ago
- Audit Powershell and search from known keywords in history #Blueteam☆25Updated 5 years ago
- A Go client for crobat☆24Updated 5 years ago
- Perform various SMB-related attacks, particularly useful for testing large Active Directory environments.☆41Updated 2 years ago
- Automate SSH communication with firewalls, switches, etc.☆26Updated 7 years ago
- ☆44Updated 6 years ago
- Proof-of-Concept exploits for CVE-2017-11882☆42Updated 7 years ago
- Vulnerability consolidation and management tool, enhances scan results by merging different findings of the same weakness across multiple…☆24Updated 2 years ago
- Python3 Metasploit automation library☆21Updated 2 years ago
- Repo for proof of concept exploits and tools.☆56Updated 4 years ago
- Community-based integrated malware identification system☆82Updated 2 years ago
- ☆59Updated 4 years ago
- Slides, papers, etc☆31Updated last year
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago