Monday, June 1, 2020
Home Tags Vulnerable

Tag: Vulnerable

Must Need

Skadi : Collect, Process & Hunt With Host Based Data From MacOS, Windows & Linux

Skadi : Collect, Process & Hunt With Host Based Data From...

Skadi is a free, open source collection of tools that enables the collection, processing and advanced analysis of forensic artifacts and images....
BlueGhost : Network Tool Designed To Assist Blue Teams In Banning Attackers From Linux Servers

BlueGhost : Network Tool Designed To Assist Blue Teams In Banning...

BlueGhost tool utilises various Linux network tools and bash scripting to assist blue teams on defending Debian and Ubuntu based servers from...
ROADTools : The Azure AD Exploration Framework

ROADTools : The Azure AD Exploration Framework

ROADtools is a framework to interact with Azure AD. It currently consists of a library (roadlib) and the ROADrecon Azure AD exploration...
IOCExtract : Advanced Indicator Of Compromise (IOC) Extractor

IOCExtract : Advanced Indicator Of Compromise (IOC) Extractor

IOCExtract is an advanced Indicator of Compromise (IOC) extractor. This library extracts URLs, IP addresses, MD5/SHA hashes, email addresses, and YARA rules...
SMTPTester : Small Python3 Tool To Check Common Vulnerabilities In SMTP Servers

SMTPTester : Small Python3 Tool To Check Common Vulnerabilities In SMTP...

SMTPTester is a python3 tool to test SMTP server for 3 common vulnerabilities: Spoofing - The ability to send...
Spyse : Python API Wrapper & Command-Line Client For The Tools Hosted On Spyse.com

Spyse : Python API Wrapper & Command-Line Client For The Tools...

Spyse is a developer of complete DAAS (Data-As-A-Service) solutions for Internet security professionals, corporate and remote system administrators, SSL / TLS encryption...
Dsiem : Security Event Correlation Engine For ELK Stack

Dsiem : Security Event Correlation Engine For ELK Stack

Dsiem is a security event correlation engine for ELK stack, allowing the platform to be used as a dedicated and full-featured SIEM...