Tool to automate corporate network segmentation test
☆21Aug 6, 2020Updated 5 years ago
Alternatives and similar repositories for el_segmentador
Users that are interested in el_segmentador are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Personal Notes.☆11Jun 2, 2018Updated 7 years ago
- ☆14Jul 13, 2020Updated 5 years ago
- A checklist of items to check, especially when inheriting a foreign network.☆29Mar 6, 2019Updated 7 years ago
- Osquery Packs we use for customer security hardening☆12Jun 30, 2025Updated 9 months ago
- This extension replaces the default repeater tab name with the URL path of the repeater request.☆24Sep 3, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Bug Bounty Clipboard☆17Nov 6, 2019Updated 6 years ago
- DO with Terraform and Ansible☆11Jun 5, 2018Updated 7 years ago
- A BurpSuite plugin for BBRF☆26Nov 17, 2024Updated last year
- Rehashing APIs to prevent hash based detection☆14Jan 7, 2025Updated last year
- ☆38May 31, 2017Updated 8 years ago
- Tool to mount all readable CIFS shares of a remote system locally to a linux system. This allows the use tools like filesystem GUIs, tree…☆16Jul 12, 2023Updated 2 years ago
- A network segmentation and egress control testing tool for PCI DSS v4.0 compliance. Automatically discovers network segments, validates i…☆13Aug 15, 2025Updated 8 months ago
- A Proof of Concept for Clickjacking Attacks☆70Jan 30, 2021Updated 5 years ago
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Sep 11, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- The offical exploit for Pandora v7.0NG Post-auth Remote Code Execution CVE-2019-20224☆14Jan 10, 2020Updated 6 years ago
- ☆23Mar 4, 2025Updated last year
- The Proxy Auto Configuration (PAC) file dynamic generator which allows you to specify the proxying rules and the PAC-file will be generat…☆10Dec 5, 2019Updated 6 years ago
- CVE-2020-25223☆11Sep 13, 2021Updated 4 years ago
- A script to automatically dump all URLs present in /server-status to a file locally.☆24Feb 11, 2025Updated last year
- ☆10Dec 8, 2022Updated 3 years ago
- ☆19Aug 26, 2020Updated 5 years ago
- ☆11Dec 5, 2020Updated 5 years ago
- string/file/shellcode encryptor using AES/XOR☆11Oct 15, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- netbeacon - monitoring your network capture, NIDS or network analysis process☆20Apr 5, 2026Updated 2 weeks ago
- All Solana programs as of 2022-02-11☆19Feb 20, 2022Updated 4 years ago
- Kali Linux Cheat Sheet for Penetration Testers☆14Jun 19, 2017Updated 8 years ago
- ☆14Nov 15, 2020Updated 5 years ago
- A library to deep merge json files with array operations☆11Mar 1, 2026Updated last month
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Sep 14, 2024Updated last year
- ☆31Aug 13, 2025Updated 8 months ago
- A Go(lang) IDS rule parser☆13Jun 10, 2019Updated 6 years ago
- SSL Pinning bypass using frida server for Mobile Application Penetration Testing☆15Jan 6, 2021Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- AWS S3 Bucket/Object Finder☆25Nov 11, 2017Updated 8 years ago
- Reads in a list of domains or subdomains and crawls them for references to S3 buckets☆10Nov 21, 2023Updated 2 years ago
- Android Pentest Setup Environment☆30May 9, 2022Updated 3 years ago
- Win32 Differential Update Library☆14Dec 30, 2019Updated 6 years ago
- John the Ripper 1.8.0.13-jumbo-1-bleeding-0abfc74 2018-05-15 0832☆10May 17, 2018Updated 7 years ago
- Scan for and exploit the zerologon vulnerability.☆10Sep 15, 2020Updated 5 years ago
- Finds Domain Controller on a network, enumerates users, AS-REP Roasting and hash cracking, bruteforces password, dumps AD users, DRSUAPI,…☆18Sep 23, 2023Updated 2 years ago