0xHaskar / Obsidian-PentestLinks
Сборная солянка по разным направлениям в ИБ!
☆59Updated 2 weeks ago
Alternatives and similar repositories for Obsidian-Pentest
Users that are interested in Obsidian-Pentest are comparing it to the libraries listed below
Sorting:
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆61Updated last year
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆122Updated last year
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆79Updated last year
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆107Updated last year
- Living Off The Land (LOTL) persistent Reverse shell☆102Updated last year
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆36Updated last year
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆65Updated last year
- Analyse MSI files for vulnerabilities☆138Updated last year
- ☆65Updated last year
- A tool to remotely detect unusual sessions opened on windows machines using RPC☆117Updated 4 months ago
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆52Updated 7 months ago
- A Repository to Track Anti-Forensic Techniques☆113Updated 2 years ago
- ☆162Updated 2 years ago
- ☆101Updated last year
- Capture screenshots of onion services on an onion service.☆72Updated last year
- Cisco IOS Security Inspector☆37Updated 2 weeks ago
- Top 400 passwords as per HaveIBeenPwned☆22Updated last year
- An asynchronous TCP and UDP port scanner developed by the late Jack C. Louis.☆36Updated 11 years ago
- Keylogging server and client that uses DNS tunneling/exfiltration to transmit keystrokes through firewalls.☆274Updated last year
- Repo for all my exploits/PoCs☆53Updated 5 months ago
- Modular framework for automating triaging, malware analysis, and analyst workflows☆42Updated 6 months ago
- PoC that downloads an executable from a public SSL certificate☆130Updated 3 months ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆126Updated 7 months ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Updated last year
- ☆37Updated last year
- A meta-list of public references to threat actor profiles and APT group datasets.☆71Updated last month
- Persistent Powershell backdoor tool {😈}☆122Updated last year
- ☆35Updated last year
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆30Updated last year