vitalyford / gencybercoin
GenCyberCoin is a project sponsored by NSA/NSF GenCyber program. A demo is deployed here:
☆8Updated 9 months ago
Related projects ⓘ
Alternatives and complementary repositories for gencybercoin
- A collection of tools adversaries commonly use in an attack.☆14Updated 2 months ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Updated 2 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆16Updated 3 years ago
- Impacket is a collection of Python classes for working with network protocols.☆10Updated last year
- Maltego transform with Keskivonfer☆14Updated 4 years ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7Updated 2 years ago
- Simple utility to manage multiple ssh☆14Updated 2 years ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆11Updated 2 years ago
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆12Updated 5 months ago
- A python network scanner using scapy☆20Updated 4 years ago
- Python driver for Wappalyzer, a web application detection utility.☆10Updated 4 years ago
- Collection of exploits that were verified by an automated system☆13Updated 3 years ago
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆15Updated 2 years ago
- A tool to embed files into images☆11Updated 3 years ago
- DNS logging, detection, ...☆15Updated 2 years ago
- 3gsocks - a reverse connection socks5 based network pivot☆9Updated 3 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆32Updated 3 years ago
- A tool to run nmap against each line in a script.☆16Updated 3 years ago
- Extract endpoints from specific Git repository for fuzzing☆21Updated 4 years ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated last year
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated 7 months ago
- Damn Vulnerable ElectronJS App (DVEA)☆11Updated 2 months ago
- Central IoC scanner based on Loki☆20Updated 3 years ago
- The lazy box is developed for setting up a good testing environment for infosec peoples easily. Mostly this box has all the necessary lib…☆12Updated 2 years ago
- A python script file to statically and dynamically investigate and analyse binary files for buffer overflow exploits.☆10Updated 5 months ago
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆19Updated 9 months ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 3 weeks ago
- Kibana app for RedELK☆16Updated last year
- pwncat windows c2 components☆17Updated 3 years ago