vpereira / seccheckLinks
upstream for seccheck
☆15Updated 6 years ago
Alternatives and similar repositories for seccheck
Users that are interested in seccheck are comparing it to the libraries listed below
Sorting:
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated 7 months ago
- iknowthis Linux SystemCall Fuzzer☆20Updated 6 years ago
- Main repository to pull all Cisco related projects.☆15Updated 7 years ago
- FastIR Agent is a Windows service to execute FastIR Collector on demand☆14Updated 8 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Linux-KVM with rVMI extensions☆22Updated 7 years ago
- ☆12Updated 10 months ago
- dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software☆55Updated 5 years ago
- Repository for proxenet plugins☆14Updated 8 years ago
- smtp-user-enum.pl ported into a recon-ng module.☆9Updated 11 years ago
- Forensics triage tool relying on Volatility and Foremost☆26Updated last year
- suspect is a simple bash triage tool☆18Updated 6 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Updated 7 years ago
- Proof-of-concept that makes a guess at what applications are being tunneled through an SSH session. It works primarily by analyzing packe…☆10Updated 11 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- ☆20Updated 7 years ago
- ☆15Updated 8 years ago
- The FastIR Server is a Web server to schedule FastIR Collector forensics collect thanks to the FastIR Agent☆12Updated 8 years ago
- Miscellaneous one-off scripts, exploits, tools, sample code, ...☆10Updated 6 years ago
- ☆22Updated 4 years ago
- #INFILTRATE19 raptor's party pack.☆30Updated last year
- GSAudit at Symantec, ExeAudit at RIM, RECX Binary Assurance for Windows at Recx etc. - core library now WinBinaryAudit☆24Updated 9 years ago
- Generate MAEC XML from Ero Carrera's pefile output☆15Updated 8 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Updated 5 years ago
- Write ups of solution for CTF challenges I solved☆25Updated 3 years ago
- My personal Automated Malware Analysis Sandboxes and Services☆24Updated 8 years ago
- ☆16Updated 8 years ago
- A script to automate Jenkins credential store decryption☆17Updated 7 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆9Updated 8 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆18Updated 7 years ago