0xHaskar / Obsidian-Pentest
Сборная солянка по разным направлениям в ИБ!
☆50Updated last week
Alternatives and similar repositories for Obsidian-Pentest:
Users that are interested in Obsidian-Pentest are comparing it to the libraries listed below
- Linux-based botnet builder designed for creating advanced botnet payloads.☆77Updated 2 weeks ago
- RCE PoC for Empire C2 framework <5.9.3☆26Updated last year
- ☆39Updated last month
- ☆19Updated this week
- Cisco IOS Security Inspector☆28Updated 3 weeks ago
- ☆53Updated 4 months ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆61Updated 8 months ago
- ☆38Updated 4 months ago
- LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysis☆31Updated 2 months ago
- ChromeStealer is a tool for educational purposes to demonstrate how to extract and decrypt stored passwords from Google Chrome on a Windo…☆145Updated 9 months ago
- An asynchronous TCP and UDP port scanner developed by the late Jack C. Louis.☆34Updated 10 years ago
- ☆60Updated 11 months ago
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆52Updated 7 months ago
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆51Updated last month
- ☆34Updated last year
- LSTAR - CobaltStrike Translated to EN☆15Updated last year
- C++ Staged Shellcode Loader with Evasion capabilities.☆92Updated 6 months ago
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆33Updated 10 months ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆120Updated last year
- PowerShell script to generate ShellCode in various formats☆41Updated 7 months ago
- A collection of all my personal cheat sheets and guides as I progress through my career in offensive security.☆192Updated 2 months ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- A C2 framework built for my bachelors thesis☆55Updated 5 months ago
- A free data collection and YARA scanning tool for cybersecurity incident investigation, compromise assessment and threat hunting☆15Updated 5 months ago
- ☆24Updated last year
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆39Updated last year
- Repo for all my exploits/PoCs☆50Updated 2 months ago
- Abusing VirusTotal API to host our C2 traffic, usefull for bypassing blocking firewall rules if VirusTotal is in the target white list , …☆27Updated 2 years ago
- An OSINT tool tailored for comprehensive collection, analysis, and interpretation of cyber threat intelligence from Telegram channels and…☆89Updated last year
- Search for c2 servers based on netlas☆39Updated last year