Tool to automate corporate network segmentation test
☆21Aug 6, 2020Updated 5 years ago
Alternatives and similar repositories for el_segmentador
Users that are interested in el_segmentador are comparing it to the libraries listed below
Sorting:
- Osquery Packs we use for customer security hardening☆12Jun 30, 2025Updated 8 months ago
- Personal Notes.☆11Jun 2, 2018Updated 7 years ago
- ☆14Jul 13, 2020Updated 5 years ago
- Bug Bounty Clipboard☆17Nov 6, 2019Updated 6 years ago
- Tool to mount all readable CIFS shares of a remote system locally to a linux system. This allows the use tools like filesystem GUIs, tree…☆16Jul 12, 2023Updated 2 years ago
- ☆19Aug 26, 2020Updated 5 years ago
- CVE-2020-14882 Weblogic-Exp☆17Oct 29, 2020Updated 5 years ago
- ☆23Mar 4, 2025Updated last year
- Server and avi file to exploit FFmpeg HLS parse☆22Jun 26, 2019Updated 6 years ago
- ☆27Aug 18, 2023Updated 2 years ago
- Simple S3 Bucket Testing Software☆31Nov 4, 2021Updated 4 years ago
- Automatic detection engineering technical state compliance☆55Jul 7, 2024Updated last year
- Security checks for http headers and cookies☆27Feb 11, 2021Updated 5 years ago
- A BurpSuite plugin for BBRF☆25Nov 17, 2024Updated last year
- ☆26Apr 5, 2020Updated 5 years ago
- A Microsoft Windows service to provide telemetry on Windows executable memory page changes to facilitate threat detection☆32Oct 7, 2020Updated 5 years ago
- Revised shell script for parsing .gnmap, .xml, or .nmap port scan results files to a CSV list, lists of IPs per port, web urls, and a sum…☆13Apr 17, 2020Updated 5 years ago
- Windows LNK/URL shortcut auto-binding hotkey (not a bug, feature)☆30Mar 22, 2018Updated 7 years ago
- Android Pentest Setup Environment☆30May 9, 2022Updated 3 years ago
- A simple intrusion detection system that detects anomalous IP payloads, vertical and horizontal port scanning attacks in the selected net…☆10Apr 16, 2018Updated 7 years ago
- Docker container for running CobaltStrike 4.10☆38Sep 18, 2024Updated last year
- A small utility to generate a word security report by using a knowledge base(XLSX).☆12Nov 25, 2023Updated 2 years ago
- volatility explorer☆92Nov 16, 2020Updated 5 years ago
- Bypass Windows Defender with py2exe from memory.☆40Feb 10, 2022Updated 4 years ago
- A collection of useful PowerShell tools to collect, organize, and visualize Sysmon event data☆39Mar 23, 2020Updated 5 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- Tool useful to discover services behind unknown ports☆14May 20, 2021Updated 4 years ago
- Install and configure mssql on your system.☆10Dec 22, 2023Updated 2 years ago
- John the Ripper 1.8.0.13-jumbo-1-bleeding-0abfc74 2018-05-15 0832☆10May 17, 2018Updated 7 years ago
- WSO SHELL , wso shell , WSO.php , wso.php , webshell , wso-shell веб-шелл , шелл , WSO2.5 , WSO2.5.1 , WSO2.php , Shell download, C99 , …☆10Jun 25, 2016Updated 9 years ago
- ☆15Sep 4, 2024Updated last year
- Python script to give you subsets of the nmap "top-ports". For example, I want the 10th to 100th most common TCP ports. Spits out a comma…☆18Mar 8, 2020Updated 6 years ago
- MasTKO is a security tool which detects DNS entries associated with AWS’s EC2 servers susceptible to takeover attack and attempts a takeo…☆11Jun 14, 2023Updated 2 years ago
- Live-Armor: Building Custom Linux Live Images for Security Sandboxing☆11Mar 25, 2015Updated 10 years ago
- ☆11Dec 5, 2020Updated 5 years ago
- string/file/shellcode encryptor using AES/XOR☆11Oct 15, 2023Updated 2 years ago
- ☆12Oct 1, 2024Updated last year
- CVE-2019-2729 Exploit Script☆46Feb 19, 2020Updated 6 years ago
- ☆32Dec 30, 2022Updated 3 years ago