☆21Jul 29, 2019Updated 6 years ago
Alternatives and similar repositories for honeybadger
Users that are interested in honeybadger are comparing it to the libraries listed below
Sorting:
- PSAttck is a light-weight framework for the MITRE ATT&CK Framework.☆38Jan 11, 2022Updated 4 years ago
- The ultimate repository for remotely deploying Crowdstrike sensors quickly and discreetly on any other EDR platform.☆24Aug 12, 2025Updated 6 months ago
- The "Virtual Whale" OSINT CTF at BSides DFW 2019!☆22Nov 2, 2019Updated 6 years ago
- Tools and resources for web app hacking. The payloads.txt documents are a must have for your Burpsuite intruder payload armory. They've h…☆28Jun 10, 2019Updated 6 years ago
- A Modular MWDB Utility to Collect Fresh Malware Samples☆34May 17, 2021Updated 4 years ago
- Collection of tips, tools and tutorials around infosec☆29May 18, 2017Updated 8 years ago
- Black Friday deals (Cyber/OSINT/Infosec)☆29Dec 6, 2020Updated 5 years ago
- ☆77Jun 25, 2019Updated 6 years ago
- A bunch of scripts I use to work with urlscan.io☆35Oct 25, 2019Updated 6 years ago
- Join RHEL and Debian based systems to Active Directory☆11Apr 18, 2020Updated 5 years ago
- A powerful hardware ID spoofing tool designed to modify system identifiers for privacy and security purposes. Change MAC addresses, HWID,…☆26Feb 28, 2026Updated last week
- A Golang implementation of clubby789's implementation of CVE-2021-4034☆11Jan 27, 2022Updated 4 years ago
- A collection of powershell scripts that are designed to be ran from a Microsoft Defender for Endpoint Live Response terminal, utilizing o…☆12Apr 26, 2023Updated 2 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- ☆10Nov 15, 2020Updated 5 years ago
- OSCP guide and Red Team assessment Guide☆37Jul 9, 2020Updated 5 years ago
- The PoLRBear Project☆35Mar 12, 2021Updated 4 years ago
- ☆49Dec 11, 2025Updated 2 months ago
- A Search command to explore Elasticsearch data within Splunk.☆40Sep 14, 2018Updated 7 years ago
- A collection of Python resources for Blue Team security work☆16Sep 23, 2018Updated 7 years ago
- A simple lyrics editor (generator and organizer as well) for .LRC files.☆11Oct 27, 2023Updated 2 years ago
- Content for cyber defense course☆14Oct 15, 2014Updated 11 years ago
- Python CLI covering the FileScan.IO API - enabling automatic interaction with www.filescan.io or private instances☆16Jul 15, 2025Updated 7 months ago
- ☆11Apr 2, 2022Updated 3 years ago
- ☆12Feb 9, 2025Updated last year
- A powershell script for creating a Windows honeyport.☆12Jun 24, 2015Updated 10 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Aug 16, 2022Updated 3 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Jan 14, 2021Updated 5 years ago
- PowerShell scripts to facilitate Cross-Tenant migrations!☆12Aug 10, 2023Updated 2 years ago
- ☆12Apr 20, 2025Updated 10 months ago
- ☆14Dec 6, 2023Updated 2 years ago
- Solving CAPTCHA with Image Classification☆10Mar 13, 2025Updated 11 months ago
- ☆15Aug 13, 2014Updated 11 years ago
- RATs library 2003 to present☆16Oct 14, 2023Updated 2 years ago
- ☆13Jan 24, 2025Updated last year
- Transform EQL detection rules to VQL artifacts☆12Nov 12, 2021Updated 4 years ago
- Repo for hosting various scripts for creating users for password spraying and other password attacks.☆11Jul 9, 2020Updated 5 years ago
- ☆10Jan 14, 2022Updated 4 years ago
- Fake SMB and SAMR data☆11Oct 27, 2019Updated 6 years ago