Basic network sec tool for real-time threat detection and C2 communication prevention. Features 70+ detection modules, IOC integration, customizable alerts, and a dashboard with analytics. API-ready for seamless security solution integration.
☆17Jun 11, 2024Updated last year
Alternatives and similar repositories for InviGuard
Users that are interested in InviGuard are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Projected developed for fun only that simulates APT 29 and Lockbit TTPs, showcasing phishing, ISO execution, and DLL proxying for persist…☆62May 3, 2024Updated last year
- Modified version of Process monitor that bypasses procmon detection for anti-debuggers☆24May 6, 2024Updated last year
- Offensive toolkit and BloodHound graph creator for DPAPI blobs and master key files☆15Jan 10, 2026Updated 3 months ago
- Automate Cobalt Strike keystore file for Teamserver SSL.☆11Feb 1, 2022Updated 4 years ago
- C2 redirector as a web API☆10May 22, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆38Oct 3, 2025Updated 6 months ago
- LuLu is the free macOS firewall☆12Jun 28, 2022Updated 3 years ago
- ☆19Nov 28, 2024Updated last year
- ⚠️ Malware Development training ⚠️☆40Feb 24, 2025Updated last year
- Learning progress in CyberTalents Blue Team Scholarship 2023. Write-ups, solutions, and notes for challenges & topics. Join my cybersecur…☆26Sep 28, 2023Updated 2 years ago
- A powerful macOS triage collection tool designed for forensic analysis. It gathers critical system artifacts such as FSEvents, Spotlight,…☆41Oct 24, 2025Updated 5 months ago
- AWS X-Ray for Covert Command & Control☆45Oct 13, 2025Updated 5 months ago
- HTML smuggling is not an evil, it can be useful☆14Jan 28, 2023Updated 3 years ago
- Kali in a Box - Containerized and fully operational within your Browser☆13Nov 17, 2025Updated 4 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Custom dyld version inherited from original Apple dyld implementation☆23Apr 27, 2024Updated last year
- 🗄️ Collection and organization of information ℹ️☆19Mar 21, 2026Updated 3 weeks ago
- Butler 是一个用于自动化服务管理和任务调度的工具项目。☆16Updated this week
- Enhanced Stealth Tunnel for Linux (Red Team Ops on compromised machine with root)☆15Jun 10, 2025Updated 10 months ago
- A post-exploitation toolkit to simulate the weaponization and detection of native Windows binaries based on LOLBas framework.☆32Jun 11, 2023Updated 2 years ago
- Repository to gather the .NET malware I will be developing☆18Mar 7, 2026Updated last month
- ☕ Manage and create a WiFi Hotspot with PowerShell 📶☆17Dec 25, 2023Updated 2 years ago
- A public repository of MITRE ATT&ACK TTP mappings by BushidoUK for OSINT reports that lack a section breaking down the TTPs.☆26Mar 20, 2025Updated last year
- Охотник (Hunter) is a simple Adversary Simulation tool developed for achieves stealth through API unhooking, direct and indirect syscalls…☆94Apr 23, 2025Updated 11 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Penetration Testing Interview Questions☆54Apr 15, 2022Updated 3 years ago
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆13Dec 15, 2022Updated 3 years ago
- Beacon Object File allowing creation of Beacons in different sessions.☆83May 23, 2022Updated 3 years ago
- Dons Js Scanner is a sleek command-line tool that hunts for hidden treasures—API keys, credentials, and secrets—lurking in the JavaScript…☆86Apr 1, 2026Updated last week
- ☆52Sep 26, 2025Updated 6 months ago
- ☆40May 21, 2022Updated 3 years ago
- Toolkit of Python scripts for web security, network recon, login brute-forcing, and ARP spoofing experiments. Designed strictly for learn…☆29Nov 28, 2025Updated 4 months ago
- ATT&CK Models of the Threat Actor "Phineas Fisher"☆18Apr 30, 2020Updated 5 years ago
- All my POC related to malware development☆15Feb 19, 2026Updated last month
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- A PoC .net shell which uses a GitHub.com repository for the communication channel.☆11Oct 25, 2018Updated 7 years ago
- Reverse Engineering and Debugging Malware☆31Feb 27, 2023Updated 3 years ago
- Research into WinSxS binaries and finding hijackable paths☆30Dec 7, 2025Updated 4 months ago
- Evade EDR's the simple way, by not touching any of the API's they hook.☆170Mar 16, 2026Updated 3 weeks ago
- Feed of phish-domains found by Validin Threat Intelligince Platform☆36Apr 4, 2026Updated last week
- Rebuild of portspoof in GO with additional features.☆30Updated this week
- Pinjectra is a C/C++ OOP-like library that implements Process Injection techniques (with focus on Windows 10 64-bit)☆16Sep 4, 2020Updated 5 years ago