Giter VIP home page Giter VIP logo

Hi there 👋

ProofPoint Certification Proof Point Commvault Core Enablement Harmony Endpoint Microsoft Certification Zerto Certified Aviatrix Certified Quantum IBM

mrfelpa's Projects

accountbruteforcetest icon accountbruteforcetest

This script helps pentesters implement a brute force attack on Windows computers in an Active Directory domain.

ad_real_time_monitor icon ad_real_time_monitor

A security tool for monitoring real-time changes to Active Directory. and is designed to detect and prevent unauthorized modifications to Active Directory domains.

adminlocalinspect icon adminlocalinspect

The script can be used to identify potential vulnerabilities and assess the security of target systems.

alicebackup icon alicebackup

Backup Full + Differential write in posix shell. Use Rsync+ssh

automaticwazuh icon automaticwazuh

This script automates the installation and configuration of Wazuh, Elasticsearch, and Kibana for host-based monitoring. It sets up the Wazuh manager, Wazuh API, Filebeat, Elasticsearch, and Kibana, allowing you to monitor and analyze security events on your system.

autotube icon autotube

This Python script automates the process of creating YouTube accounts using actual user-provided data

azure_audit icon azure_audit

PowerShell scripting tool for Azure security auditing.

azurejmetertest icon azurejmetertest

This script automates the deployment and execution of a jmeter-based load test in the Azure Load Test Service.

certificatechecker icon certificatechecker

A PowerShell script designed to check the health and status of a Windows Server running Active Directory Certificate Services (AD CS).

collector icon collector

Collector tool is designed to assist in collecting information and exploiting vulnerabilities on websites

collector_windows_evidence icon collector_windows_evidence

This tool automates the collection of evidence on Windows machines. The main objective is to assist in forensic investigation and data preservation in cases of security incidents or other situations that require the analysis of an operating system.

digi_prev icon digi_prev

Um modelo para prever a próxima letra em uma sequência de digitação em tempo real. A previsão é baseada em um algoritmo probabilístico simples que calcula a probabilidade de cada letra do alfabeto, com base na última letra digitada.

dnsrato icon dnsrato

Ferramenta de Reconhecimento para Pentest

docker_vuln_check icon docker_vuln_check

A Python script to check whether a host is vulnerable to attacks that exploit exposed Docker APIs.

exploit_pingback_wordpress icon exploit_pingback_wordpress

This script assists security researchers in their proof of concept to validate the existence of an XML-RPC vulnerability on WordPress sites.

fake_news_detection icon fake_news_detection

Access the validity of websites for information and to evaluate sources for misleading information using ML models

hikextractor icon hikextractor

Script to parse HIKVISION DVR hard drives and export the footage

httpdownloader icon httpdownloader

This is a script that simplifies the process of downloading files from an HTTP server

julia icon julia

The Julia Programming Language

ldapscan icon ldapscan

A Python script that allows you to test an LDAP server, helping to identify potential security vulnerabilities and misconfigurations in LDAP

logscan icon logscan

Simple application written in Python designed to analyze log files for specific errors and generate detailed reports based on the types of errors identified.

monitor icon monitor

This script monitors network connections in real time, verifying geographical origin and allowing email notifications.

mtm_attack_detector icon mtm_attack_detector

Is a desktop application designed to identify potential Man-in-the-Middle (MITM) attacks on your network. It leverages machine learning to analyze network traffic and raise alerts when suspicious activity is detected.

nostr-stealth icon nostr-stealth

Built on top of the Nostr protocol, specifically designed to ensure sender and receiver metadata full anonymity. Leveraging the concept of channels (or mixers), Nostr-Stealth ensures that individual messages between users cannot be distinguished or differentiated, thus enhancing user privacy.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.