ytisf / LookingGlass
Customisable PCAP parser and research assistant
☆26Updated 7 years ago
Alternatives and similar repositories for LookingGlass:
Users that are interested in LookingGlass are comparing it to the libraries listed below
- Set of PoC for exploits for QRadar SIEM☆15Updated 7 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 7 years ago
- GUI Tool to generate threat intelligence information in various formats☆43Updated 7 years ago
- Phishing e-mail repository☆37Updated 4 years ago
- Megatron - A System for Abuse- and Incident Handling☆44Updated 8 years ago
- A short and small memory forensics helper.☆52Updated 7 years ago
- Just a collection of scripts☆40Updated 4 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Updated 10 years ago
- ssh session type for metasploit☆98Updated 2 years ago
- Data exfiltration PoC scripts☆24Updated 9 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆66Updated 6 years ago
- CTF Writeups☆18Updated 7 years ago
- Searches for interesting cached DNS entries.☆54Updated 10 years ago
- A simple Nessus results viewer☆49Updated 11 years ago
- Comprehensive Pivoting Framework☆20Updated 8 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- Projects and POCs☆60Updated 10 years ago
- Multithreaded DNS recursive host brute-force tool☆13Updated 9 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- Burp plugin which supports in finding privilege escalation vulnerabilities☆40Updated 2 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 9 years ago
- Dependencies for Veil 3☆18Updated 8 years ago
- Gmail Knocker☆21Updated 7 years ago
- Security Advisories and Researches☆16Updated 10 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- Python script to batch query the Tor Relays and Bridges☆36Updated 6 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆42Updated 4 years ago
- Vulnerable Node.js Web Application to pratice with your pentesting skills☆21Updated 7 years ago
- A while back antirez, in a post to Bugtraq, detailed a new Tcp portscan method.☆16Updated 7 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago