zseha / awesome-medsecLinks
A curated list of awesome projects, libraries, and tools for MedSec.
☆17Updated 6 years ago
Alternatives and similar repositories for awesome-medsec
Users that are interested in awesome-medsec are comparing it to the libraries listed below
Sorting:
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- Exfiltration based on custom X509 certificates☆26Updated last year
- Audit Powershell and search from known keywords in history #Blueteam☆25Updated 5 years ago
- Simple Live Data Collection Tool☆21Updated 4 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- ☆33Updated 5 months ago
- Hashes of infamous malware☆26Updated last year
- Extract credentials from lsass remotely☆16Updated 5 years ago
- ☆22Updated 4 years ago
- Posts about different topics☆36Updated last year
- isodump - ISO dump utility☆40Updated 6 years ago
- A rogue DNS detector☆23Updated last year
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆35Updated 3 years ago
- various slides and presentations I've worked on☆19Updated 3 months ago
- This contains common OSCP local exploits and enumeration scripts☆11Updated 9 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆38Updated 5 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 4 months ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- Finding sensitive information in the trimmed parts of cropped images☆30Updated 3 years ago
- Lab Environment for learning client-side attacks such as CSRF, Clickjacking, XSS, and CORS abuse.☆20Updated 2 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆37Updated 5 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 7 months ago
- ☆20Updated 4 years ago
- Continuous kerberoast monitor☆45Updated last year
- Extract payload URLs from Follina (CVE-2022-30190) docx and rtf files☆31Updated 3 years ago
- Any presentation we've given at FortyNorth Security☆34Updated 3 years ago
- Methods of C2☆21Updated 9 years ago
- ☆16Updated 7 years ago
- ☆23Updated 4 years ago
- s3eker is an extensible way to find open S3 buckets.☆17Updated 4 years ago