Basic network sec tool for real-time threat detection and C2 communication prevention. Features 70+ detection modules, IOC integration, customizable alerts, and a dashboard with analytics. API-ready for seamless security solution integration.
☆17Jun 11, 2024Updated last year
Alternatives and similar repositories for InviGuard
Users that are interested in InviGuard are comparing it to the libraries listed below
Sorting:
- Projected developed for fun only that simulates APT 29 and Lockbit TTPs, showcasing phishing, ISO execution, and DLL proxying for persist…☆61May 3, 2024Updated last year
- Offensive toolkit and BloodHound graph creator for DPAPI blobs and master key files☆14Jan 10, 2026Updated last month
- Automate Cobalt Strike keystore file for Teamserver SSL.☆11Feb 1, 2022Updated 4 years ago
- C2 redirector as a web API☆10May 22, 2021Updated 4 years ago
- Nice try reading NTDLL from disk, nerd.☆19Apr 18, 2022Updated 3 years ago
- HTML smuggling is not an evil, it can be useful☆14Jan 28, 2023Updated 3 years ago
- ☆19Nov 28, 2024Updated last year
- reverse engineering random malwares☆22Feb 1, 2025Updated last year
- Playing with packets in C#☆15Aug 16, 2024Updated last year
- Repository to gather the .NET malware I will be developing☆18Mar 23, 2025Updated 11 months ago
- This project is an EDRSandblast fork, adding some features and custom pieces of code.☆25Sep 29, 2023Updated 2 years ago
- A public repository of MITRE ATT&ACK TTP mappings by BushidoUK for OSINT reports that lack a section breaking down the TTPs.☆27Mar 20, 2025Updated 11 months ago
- Malwarekid python BadUSB payload encoder for generating powershell script in bas64☆22Nov 6, 2024Updated last year
- P/Invoke definitions from the most-of-the-time offline offline pinvoke.net. Website: https://ricardojoserf.gitbook.io/pinvoke☆23Mar 23, 2025Updated 11 months ago
- Satanic Crypter A powerful tool designed to convert EXE files into BAT files with advanced features and a modern GUI interface.☆11Jan 4, 2025Updated last year
- Learning progress in CyberTalents Blue Team Scholarship 2023. Write-ups, solutions, and notes for challenges & topics. Join my cybersecur…☆25Sep 28, 2023Updated 2 years ago
- A post-exploitation toolkit to simulate the weaponization and detection of native Windows binaries based on LOLBas framework.☆31Jun 11, 2023Updated 2 years ago
- Python program Fileless-PE.py generates a Python script (PEloader.py) to load a DLL or EXE file from a given URL. It provides functionali…☆30Jul 17, 2024Updated last year
- An optimized Python3 library to fetch the most recent exploit-database, create searchable indexes for CVE->EDBID and EDBID -> CVE, and pr…☆30Nov 4, 2024Updated last year
- Sample configuration to include as an Asterisk configuration to supplement automated caller ID spoofing capabilities.☆27Sep 20, 2020Updated 5 years ago
- Dumping LSASS by Unhooking MiniDumpWriteDump by getting a fresh DbgHelp.dll copy from the disk , plus functions and strings obfuscation☆31Sep 24, 2022Updated 3 years ago
- A modern, web-based GUI for Hashcat that provides an intuitive interface for hash cracking operations, featuring real-time monitoring, pe…☆34Mar 5, 2025Updated 11 months ago
- Material For Malware Analysis Fundamentals Workshop By Eslam Abbas "Mr Robot"☆23Oct 9, 2025Updated 4 months ago
- Reverse Engineering and Debugging Malware☆32Feb 27, 2023Updated 3 years ago
- ⚠️ Malware Development training ⚠️☆40Feb 24, 2025Updated last year
- ☆33Apr 7, 2020Updated 5 years ago
- Evade EDR's the simple way, by not touching any of the API's they hook.☆169Jan 29, 2025Updated last year
- Proof-of-concept modular implant platform leveraging v8☆54Mar 4, 2025Updated 11 months ago
- Terms of Use Conditional Access M365 Evilginx Phishlet☆44Jun 23, 2025Updated 8 months ago
- Beacon Object File allowing creation of Beacons in different sessions.☆83May 23, 2022Updated 3 years ago
- BypassCredGuard CS BOF☆49Jan 23, 2025Updated last year
- this project can extract contact email address from many site.☆12Sep 26, 2021Updated 4 years ago
- Just your regular Qur'an apps on Android platform, except I'm trying to make it's app size as small as possible while not sacrificing any…☆15Nov 13, 2025Updated 3 months ago
- A curated list of tools and techniques written from experience in weaponization of malware☆41Oct 26, 2023Updated 2 years ago
- Discord RAT made in powershell (open source)☆12Jul 16, 2025Updated 7 months ago
- A project managing Electronic Health Records(EHR) of patients and giving permissions to audity using Solidity(Etherium Blockchain) with T…☆11Aug 7, 2021Updated 4 years ago
- ☆14May 14, 2022Updated 3 years ago
- ☆13Sep 28, 2024Updated last year
- ☆13Jun 29, 2023Updated 2 years ago