0x6rss / keklickLinks
Keklick - C2 Hunting, Reporting and Visualization Tool
☆37Updated this week
Alternatives and similar repositories for keklick
Users that are interested in keklick are comparing it to the libraries listed below
Sorting:
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆61Updated 10 months ago
- Lena's scripts/code/resources for malware analysis☆27Updated last year
- Chiron Unpacker, developed by the Malwation MTR Team, is an Unpacker for Packers using the Assembly.Load function.☆19Updated 9 months ago
- Modular framework for automating triaging, malware analysis, and analyst workflows☆42Updated 2 months ago
- MalwareScan is a lightweight and fast malware scanner written in Python. It supports both Windows and Linux platforms and provides an ope…☆14Updated last month
- BSides Prishtina 2024 Malware Development and Persistence workshop☆88Updated last month
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆91Updated 3 months ago
- ☆67Updated 5 months ago
- ⚠️ Malware Development training ⚠️☆33Updated 5 months ago
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆51Updated 4 months ago
- Convert your shellcode into an ASCII string☆102Updated 3 weeks ago
- ☆140Updated last month
- Configuration Extractors for Malware☆109Updated 3 months ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆62Updated 11 months ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆106Updated last year
- ☆159Updated 4 months ago
- Information stealer logs parser☆72Updated 11 months ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆75Updated last year
- ☆37Updated last year
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆121Updated 3 months ago
- Vibe Malware Triage - MCP server for static PE analysis.☆63Updated 2 months ago
- Situational Awareness script to identify how and where to run implants☆54Updated 7 months ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆194Updated 4 months ago
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆78Updated 10 months ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆121Updated last year
- information about ransomware groups (Ransomware Analysis Notes)☆38Updated last year
- ☆40Updated 7 months ago
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requir…☆149Updated last year
- Shellcode encryptor using a substitution cipher with a randomly generated key.☆132Updated 6 months ago
- ☆39Updated 3 weeks ago