zerobs-rvn / hrafna
Log4j-Scanner with Bind-Receipt and custom hostnames
☆18Updated 3 years ago
Alternatives and similar repositories for hrafna:
Users that are interested in hrafna are comparing it to the libraries listed below
- ☆17Updated last year
- A tool for the lazy OSINTer that focuses on discovery of subdomains related to a specific domain. The tool will run for free in Google Ap…☆11Updated 3 years ago
- Searching .evtx logs for remote connections☆24Updated last year
- parsers to make life easier☆12Updated 4 years ago
- Exactly what it sounds like, which is something rad☆21Updated 2 years ago
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Updated 3 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- Kibana app for RedELK☆16Updated last year
- Brute Force and Scan WinRm Service☆13Updated 5 years ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆20Updated last year
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆30Updated 2 years ago
- ☆12Updated 2 years ago
- Apply a filter to the events being reported by windows event logging☆15Updated 4 years ago
- ☆13Updated 3 years ago
- A Canary which fires when uninstalled☆34Updated 3 years ago
- ☆10Updated 3 years ago
- A basic proxylogon scanner☆27Updated 3 years ago
- ☆16Updated 5 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 2 months ago
- Execute embedded Mimikatz☆13Updated 3 years ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated 2 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆13Updated 2 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Updated 3 years ago
- ☆14Updated 3 years ago
- Log converter from CS log to Ghostwriter CSV☆29Updated 4 years ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆16Updated last year
- visually see issues with supported cipher suites☆15Updated 8 months ago
- Spin up a reverse proxy quickly on Heroku☆13Updated 4 years ago
- Extracts Azure authentication tokens from PowerShell process minidumps.☆23Updated last year
- Active Directory Password Spray Testing Utility in Go☆14Updated 10 months ago