trinitor / netstat2neo4j
create cypher create statements for neo4j out of netstat files from multiple machines
☆41Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for netstat2neo4j
- Interactive Post Exploitation Tool☆36Updated 5 years ago
- A CLI tool for querying passive DNS services☆41Updated 11 months ago
- Vulnerability consolidation and management tool, enhances scan results by merging different findings of the same weakness across multiple…☆24Updated last year
- Pulse Secure SSL VPN pre-auth file reading☆50Updated 5 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 3 years ago
- ☆25Updated 3 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Updated 5 years ago
- Golang based web service to scan files with yara rules☆27Updated 7 years ago
- Python3 Metasploit automation library☆20Updated last year
- Perform various SMB-related attacks, particularly useful for testing large Active Directory environments.☆40Updated 2 years ago
- Stækka Metasploit - Extenting Metasploit☆53Updated 7 years ago
- This is a concept poc of command and control server implemented over blockchain☆46Updated 5 years ago
- Repo for proof of concept exploits and tools.☆56Updated 4 years ago
- Remote process dumping automation. Use it to dump Windows credentials remotely and extract clear text with Mimikatz offline☆35Updated 4 years ago
- Automate SSH communication with firewalls, switches, etc.☆26Updated 6 years ago
- ☆50Updated 4 years ago
- DNS server limitation mapper☆25Updated 6 years ago
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆65Updated 3 years ago
- Some of the presentations given by me☆16Updated last week
- Scrapes Router Passwords From http://www.routerpasswords.com ,more then +300 product☆45Updated 6 years ago
- Multithreaded Padding Oracle Attack on Oracle OAM (CVE-2018-2879)☆24Updated 5 years ago
- Checklist and tools for increasing security of Apache Airflow☆32Updated 3 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- initial commit☆42Updated this week
- Audit Powershell and search from known keywords in history #Blueteam☆25Updated 4 years ago
- A collection of published exploits and proof-of-concept code.☆20Updated 6 years ago