wildcardcorp / samson
Cryptanalysis and attack library
☆22Updated 3 years ago
Alternatives and similar repositories for samson
Users that are interested in samson are comparing it to the libraries listed below
Sorting:
- A Simple Log4j Indicator of Compromise Linux Detector☆15Updated 3 years ago
- Forensics triage tool relying on Volatility and Foremost☆26Updated last year
- Do the unexpected with AD GPO processing☆9Updated 6 years ago
- Docker image for reconftw, a simple script intended to perform a full recon on an objective with multiple subdomains☆10Updated 4 years ago
- ☆20Updated 4 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- Exploit for win10 SMB3.1☆17Updated 5 years ago
- Standardizing Security Titles☆13Updated 2 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆13Updated 3 years ago
- Monitor malware scanning services for your payloads☆10Updated 3 years ago
- YARA rule-based automation system to detect network attacks at byte-level☆15Updated 4 years ago
- Automated Static Analysis Framework☆9Updated 3 years ago
- Burpsuite Plugin to bypass strict RePlay protection☆12Updated 4 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 9 years ago
- Training scenarios for cyber ranges☆11Updated 5 years ago
- Public exploits☆14Updated 6 years ago
- A collection of my public security advisories.☆24Updated 3 weeks ago
- sudo-parser is a tool to audit complex sudoers files☆17Updated 2 years ago
- Simple utility to manage multiple ssh☆14Updated 2 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated 2 years ago
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Updated 5 years ago
- Miscellaneous exploit scripts☆17Updated 2 years ago
- Random Tips and Writeups.☆13Updated 6 years ago
- Hash collisions and their exploitations☆9Updated 2 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 5 months ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Updated 4 years ago
- vyos based isolation of networks☆10Updated 4 years ago
- IDS/IPS malware download evasion☆15Updated 6 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago