trinitor / netstat2neo4j
create cypher create statements for neo4j out of netstat files from multiple machines
☆41Updated 4 years ago
Alternatives and similar repositories for netstat2neo4j:
Users that are interested in netstat2neo4j are comparing it to the libraries listed below
- Interactive Post Exploitation Tool☆36Updated 5 years ago
- ☆25Updated 3 years ago
- A CLI tool for querying passive DNS services☆41Updated last year
- ☆34Updated 6 years ago
- ☆14Updated 6 years ago
- Golang based web service to scan files with yara rules☆27Updated 7 years ago
- POC for utilizing wikipedia API for Command and Control☆29Updated 2 years ago
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆18Updated 4 years ago
- Pulse Secure SSL VPN pre-auth file reading☆50Updated 5 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Updated 6 years ago
- Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests☆21Updated 7 years ago
- Vulnerability consolidation and management tool, enhances scan results by merging different findings of the same weakness across multiple…☆24Updated 2 years ago
- Perform various SMB-related attacks, particularly useful for testing large Active Directory environments.☆40Updated 2 years ago
- Checklist and tools for increasing security of Apache Airflow☆32Updated 3 years ago
- A Go client for crobat☆24Updated 4 years ago
- Burp Commander written in Go☆57Updated 5 years ago
- CVE-2020-12828 PoC and Analysis.☆28Updated 4 years ago
- Nmap to MongoDB☆12Updated 5 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 3 years ago
- The SSH Multiplex Backdoor Tool☆63Updated 5 years ago
- Reconnaissance test in Kubernetes clusters☆21Updated 6 years ago
- Repo for proof of concept exploits and tools.☆56Updated 4 years ago
- Automate SSH communication with firewalls, switches, etc.☆26Updated 6 years ago
- ☆18Updated 7 years ago
- Burp Suite Professional extension in Java for Tabnabbing attack☆13Updated 6 years ago
- A simple script to decrypt stored passwords from Oracle WebLogic Server configuration files☆30Updated 8 years ago
- Network assessment tool for various UDP Services covering both IPv4 and IPv6 protocols☆114Updated 4 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Updated 4 years ago
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆65Updated 3 years ago
- Remote process dumping automation. Use it to dump Windows credentials remotely and extract clear text with Mimikatz offline☆35Updated 5 years ago