Tool to automate corporate network segmentation test
☆21Aug 6, 2020Updated 5 years ago
Alternatives and similar repositories for el_segmentador
Users that are interested in el_segmentador are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Personal Notes.☆11Jun 2, 2018Updated 7 years ago
- ☆14Jul 13, 2020Updated 5 years ago
- A checklist of items to check, especially when inheriting a foreign network.☆29Mar 6, 2019Updated 7 years ago
- Osquery Packs we use for customer security hardening☆12Jun 30, 2025Updated 8 months ago
- A BurpSuite plugin for BBRF☆25Nov 17, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Bug Bounty Clipboard☆17Nov 6, 2019Updated 6 years ago
- Rehashing APIs to prevent hash based detection☆14Jan 7, 2025Updated last year
- Mobile Helper Framework (mhf) is a tool that automates the process of identifying the framework/technology used to create a mobile applic…☆26Dec 23, 2025Updated 3 months ago
- Tool to mount all readable CIFS shares of a remote system locally to a linux system. This allows the use tools like filesystem GUIs, tree…☆16Jul 12, 2023Updated 2 years ago
- A network segmentation and egress control testing tool for PCI DSS v4.0 compliance. Automatically discovers network segments, validates i…☆13Aug 15, 2025Updated 7 months ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆50Jul 15, 2019Updated 6 years ago
- CVE-2020-14882 Weblogic-Exp☆17Oct 29, 2020Updated 5 years ago
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Sep 11, 2021Updated 4 years ago
- The offical exploit for Pandora v7.0NG Post-auth Remote Code Execution CVE-2019-20224☆14Jan 10, 2020Updated 6 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆23Mar 4, 2025Updated last year
- The Proxy Auto Configuration (PAC) file dynamic generator which allows you to specify the proxying rules and the PAC-file will be generat…☆10Dec 5, 2019Updated 6 years ago
- A script to automatically dump all URLs present in /server-status to a file locally.☆24Feb 11, 2025Updated last year
- ☆10Dec 8, 2022Updated 3 years ago
- ☆19Aug 26, 2020Updated 5 years ago
- ☆11Dec 5, 2020Updated 5 years ago
- string/file/shellcode encryptor using AES/XOR☆11Oct 15, 2023Updated 2 years ago
- The official exploit for OCS Inventory NG v2.7 Remote Command Execution CVE-2020-14947☆19Jul 2, 2020Updated 5 years ago
- Analyze Android APK files from a browser.☆15Sep 29, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- netbeacon - monitoring your network capture, NIDS or network analysis process☆20Updated this week
- Kali Linux Cheat Sheet for Penetration Testers☆14Jun 19, 2017Updated 8 years ago
- ☆14Nov 15, 2020Updated 5 years ago
- A library to deep merge json files with array operations☆11Mar 1, 2026Updated 3 weeks ago
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Sep 14, 2024Updated last year
- ☆31Aug 13, 2025Updated 7 months ago
- This program implements port knocking for access to Windows via RDP / TS☆16Apr 5, 2021Updated 4 years ago
- A Go(lang) IDS rule parser☆13Jun 10, 2019Updated 6 years ago
- AWS S3 Bucket/Object Finder☆25Nov 11, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Android Pentest Setup Environment☆30May 9, 2022Updated 3 years ago
- Win32 Differential Update Library☆14Dec 30, 2019Updated 6 years ago
- John the Ripper 1.8.0.13-jumbo-1-bleeding-0abfc74 2018-05-15 0832☆10May 17, 2018Updated 7 years ago
- Scan for and exploit the zerologon vulnerability.☆10Sep 15, 2020Updated 5 years ago
- Finds Domain Controller on a network, enumerates users, AS-REP Roasting and hash cracking, bruteforces password, dumps AD users, DRSUAPI,…☆18Sep 23, 2023Updated 2 years ago
- A Microsoft Windows service to provide telemetry on Windows executable memory page changes to facilitate threat detection☆32Oct 7, 2020Updated 5 years ago
- A python exploit to automatically dump all the data stored by the auto-completion plugin of Ametys CMS to a local sqlite database file.☆14May 3, 2022Updated 3 years ago