RELY
EZEA
Our great sponsors
RELY | EZEA | |
---|---|---|
1 | 10 | |
2 | 91 | |
- | - | |
0.0 | 1.8 | |
almost 3 years ago | almost 3 years ago | |
Python | Shell | |
- | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
RELY
-
Made a nice OSCP enum tool
Thanks for the tip, I've already made a small triage tool for windows forensics as part of a school project https://github.com/yassirlaaouissi/RELY
EZEA
- I passed OSCP, and here is how you should(nt) do it
-
Made a nice OSCP enum tool
Made this tool based on several other tools that can simplify the enumeration proces for OSCP-like environments. Have rooted 8 boxes so far using this tool in 2 weeks time. Here is the link, let me know how you feel about it: https://github.com/yassirlaaouissi/EZEA
What are some alternatives?
OSCP-Exam-Report-Template - Modified template for the OSCP Exam and Labs. Used during my passing attempt
AutoRecon - AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.
SUDO_KILLER - A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specific misconfiguration or flaw in sudo to gain elevated privileges on the system, essentially allowing a regular user to execute commands as the root user.
nmapAutomator - A script that you can run in the background!
RecuperaBit - A tool for forensic file system reconstruction.
kobackupdec - Huawei backup decryptor
beagle - Beagle is an incident response and digital forensics tool which transforms security logs and data into graphs.
hindsight - Web browser forensics for Google Chrome/Chromium
APT-Hunter - APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the sea of windows event logs to decrease the time to uncover suspicious activity
TheHiveDocs - Documentation of TheHive
Pentest-Service-Enumeration - Suggests programs to run against services found during the enumeration phase of a Pentest
alacarte