mgaulton's starred repositories
Fail2ban-defence-nmap-and-botnet-scanning
Simple protection from bots and nmap scanning
phishtank-to-elk
A program to import phishtank dataset into elasticsearch
Search-ESsearcher
Makes searching logs stored in elasticsearch from the command line easy.
paranoid-ninja
Script to apply a Transparent proxy through Tor with nftables or iptables and can optionally forge a random MAC, localtime, ip, hostname.
misp_iptables_provisioner
Gets all events from a misp server, checks for ids flag and parses with ids_flag = true to iptables
webfilter-ng
Transparent HTTP/HTTPS/TLS web filter
block-tor-iptables
Bloquee los nodos de TOR utilizando iptables
xt_tlslist
xt_tlslist is an extension for netfilter/IPtables that allows you to filter traffic based on TLS hostnames
Login-Shield
Your first line of defense against Internet bots, hacks and probes. Login-Shield is a small set of bash scripts that implements an iptables/ipset blocklist of known sources of hack activity. Works great as a compliment with/without fail2ban. Statistics have shown it blocks 90+% of most system probes and attacks on login ports.
firewall-api
A minimal API server to remotely control iptables/ebtables.
Firewall-Access-Request
A practical demo of Tufin's RESTful APIs
PowerShellScripting
Repository for the Facebook Group PowerShell Scripting
SUDO_KILLER
A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specific misconfiguration or flaw in sudo to gain elevated privileges on the system, essentially allowing a regular user to execute commands as the root user.
UltimaScraper
Scrape all the media from an OnlyFans account - Updated regularly
purple-team-attack-automation
Praetorian's public release of our Metasploit automation of MITRE ATT&CK™ TTPs
metasploit-db_automate
A pentest scanning task automation project using custom resource files and Metasploit's internal services database.
msf-exploit-loop
Metasploit resource script to read a list of desired RHOST values and run the current exploit module for each.
Exploitivator
Automate Metasploit scanning and exploitation
auto-python-exploitdb
This is to automate the process of grabbing an exploit from exploit db and putting it into Metasploit