zet694 / promitheus_monitoringLinks
Docker Swarm - Promitheus, Grafana, Node Exporter, Loki, Promtail, Caddy
☆29Updated 5 years ago
Alternatives and similar repositories for promitheus_monitoring
Users that are interested in promitheus_monitoring are comparing it to the libraries listed below
Sorting:
- tunnel port to port traffic over an obfuscated channel with AES-GCM encryption.☆69Updated 5 years ago
- A tool to parse, deduplicate, and query multiple port scans.☆59Updated 2 years ago
- Identify common attack paths to get Domain Administrator☆22Updated 5 years ago
- A basic proxylogon scanner☆27Updated 4 years ago
- Exactly what it sounds like, which is something rad☆22Updated 2 years ago
- Tapir: a tool to search through NIST CVE database, with cache and regex.☆16Updated 2 years ago
- Take domains on stdin and output them on stdout if they get resolved☆33Updated 3 years ago
- Extract credentials from lsass remotely☆16Updated 5 years ago
- Generate malicious files using recently published homoglyphic-attack (CVE-2021-42694)☆18Updated 2 years ago
- A Zeek package to detect CVE-2021-42292, a Microsoft Excel local privilege escalation exploit.☆18Updated 3 years ago
- Distributed Nmap, wrapper around Nmap to allow distributed network enumeration.☆20Updated 2 months ago
- Emulate the handshake packets of an RDP server with python☆15Updated 7 years ago
- Help fuzz various protocols and waits for ping backs Integrates LDAP server and JNDI payload☆11Updated 3 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Updated 3 years ago
- The long shadow to emerge as other Git repositories☆18Updated last year
- Nmap script to check vulnerability CVE-2021-21972☆28Updated 4 years ago
- Zeroday Microsoft Exchange Server checker (Virtual Patching checker)☆70Updated 2 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 8 months ago
- Router socks. One port socks for all the others.☆69Updated last year
- Log converter from CS log to Ghostwriter CSV☆30Updated 4 years ago
- donLoader is a shellcode loader creation tool that uses donut to convert executable payloads into shellcode to evade detection on disk.☆20Updated 3 years ago
- A Canary which fires when uninstalled☆34Updated 4 years ago
- post exploitation user monitoring tool☆20Updated 7 years ago
- Remote Code Execution on Microsoft Exchange Server through fixed cryptographic keys☆20Updated 4 years ago
- reverse socks tunneler with ntlm and proxy support☆28Updated 5 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- misc scripts/utils that I've written that aren't deserving of own repos.☆12Updated 3 years ago
- Socks proxy server using powershell. Supports local and reverse connections for pivoting.☆11Updated 4 years ago
- ☆50Updated 5 years ago