triode3 / lsat
Linux Security Auditing Tool
☆11Updated 5 years ago
Alternatives and similar repositories for lsat:
Users that are interested in lsat are comparing it to the libraries listed below
- Capturing audio (.wav) from target using a link☆12Updated 5 years ago
- detects several virtualizations☆44Updated 9 years ago
- This repository contains additional files mentioned in the blog post☆22Updated 6 years ago
- Python script for privilege escalation for Python☆11Updated 4 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated 5 months ago
- Automate Recon process using Shell Scripting☆11Updated 3 years ago
- Tool useful to discover services behind unknown ports☆13Updated 3 years ago
- HttpDoom is a tool for response-based inspection of websites across a large amount of hosts for quickly gaining an overview of HTTP-base…☆23Updated 3 years ago
- Pentoo installer rewritten by Wuodan to be more modular☆10Updated 5 months ago
- Perl library for SHODAN☆17Updated 11 years ago
- SecrutiyTube Linux Assembly Exam☆10Updated 5 years ago
- Domain, IPv4 & v6 address & network information gathering, web server analysis, DNS- & BGP- related information☆13Updated last year
- Forensics triage tool relying on Volatility and Foremost☆25Updated last year
- ☆15Updated 6 years ago
- ☆17Updated 5 years ago
- Tor bridge running obfs4 obfuscation protocol in Alpine 🐳☆8Updated last year
- A DNS database debugger☆35Updated 2 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆39Updated 9 years ago
- Multi-head SSH honeypot system.☆20Updated last year
- Build and Interact with a Set of Virtual Machines☆15Updated 2 years ago
- Brute force password selection for EAP-MD5 authentication exchanges☆22Updated 7 years ago
- :e-mail: Enumerate usernames through SMTP service☆18Updated 5 years ago
- Geppetto - Virtual machine and infrastructure orchestration☆13Updated last month
- Docker environment for hackers☆14Updated 4 years ago
- A honeypot that can be used to observe traffic directed at home routers.☆19Updated 6 years ago
- Random notes about the universe and stuff☆16Updated 4 years ago
- Scan for subdomains using bruteforcing techniques☆44Updated 9 months ago
- Domain Seeker☆12Updated last year
- Takes in scan reports from the GVM PostgreSQL Database and dump into Elasticsearch☆14Updated last year
- A collection of tools adversaries commonly use in an attack.☆14Updated 4 months ago