
NetworkAlarm is A command-line tool to monitor local network traffic for possible security vulnerabilities. Warns user against possible nmap scans, Nikto scans, credentials sent in-the-clear,…

remediation is a Tools and utilities for remediation and incident-response handling. JewelRunner is intended to quickly analyze tcp/ip traffic for a target host and create…

Ever get excessively bothered by the test phishing emails that InfoSec sends to educate you and your co-workers? PhishThis is here to help. PhishThis will…

B2Response (beta) is a Powershell script for Logged PS Remote Command Wrapper for simplified Blue Team Forensics/IR Dependencies: + Powershell v3.0 or Higher Some Features:…

Network Monitoring Tool is A simple network monitoring tool designed to notify the network administrator about changes and vulnerabilities. Requirements + nmap version 7.00 or…

What is wsd? Wirespy is a simple network sniffer for information security that extracts interesting metadata about network traffic and logs it. That sounds like…

Ketshash is A little tool for detecting suspicious privileged NTLM connections, in particular Pass-The-Hash attack, based on event viewer logs. Requirements Account with the following…

The ROCA vulnerability has been discovered by researchers at Masaryk University (Brno, Czech Republic). As two of the researchers are also affiliated with Enigma Bridge…