0xHossam / InviGuard
Advanced network security tool for real-time threat detection and C2 communication prevention. Features 70+ detection modules, IOC integration, customizable alerts, and a dashboard with analytics. API-ready for seamless security solution integration.
☆12Updated 11 months ago
Alternatives and similar repositories for InviGuard
Users that are interested in InviGuard are comparing it to the libraries listed below
Sorting:
- exfiltration/infiltration toolkit☆23Updated last year
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆30Updated 2 weeks ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- ☆10Updated 5 months ago
- Items related to the RedELK workshop given at security conferences☆29Updated last year
- Make an Linux Kernel rootkit visible again.☆51Updated 2 months ago
- Cobalt Strike BOFS☆16Updated last year
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆21Updated last year
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆45Updated last year
- POC for CVE-2024-3183 (FreeIPA Rosting)☆21Updated 8 months ago
- APT-Attack-Simulation simulates APT 29 and Lockbit TTPs, showcasing phishing, ISO execution, and DLL proxying for persistence and privile…☆56Updated last year
- IAT Unhooking proof-of-concept☆29Updated last year
- PDump is a project for dumping leaked credentials from DEHASHED☆16Updated last year
- Check the Domain for Local Admin Access☆14Updated 2 months ago
- PowerShell script to generate ShellCode in various formats☆41Updated 7 months ago
- Situational Awareness script to identify how and where to run implants☆49Updated 5 months ago
- Discord C2 Profile for Mythic☆28Updated 2 months ago
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Updated last year
- This map lists the essential techniques to bypass anti-virus and EDR☆15Updated last year
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆33Updated last year
- Deathstar is an Empire plugin that automates gaining Domain and/or Enterprise Admin rights in Active Directory environments using common …☆18Updated last month
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆22Updated 5 months ago
- Create PDFs with HTML smuggling attachments that save on opening the document.☆29Updated last year
- Docker container for running CobaltStrike 4.10☆37Updated 7 months ago
- Contexter - A secondary context path traversal / server-side parameter pollution testing tool written in Python 3☆22Updated 8 months ago
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆24Updated 2 years ago
- CIS Benchmark testing of Windows SIEM configuration☆44Updated last year
- ☆28Updated last year
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆39Updated 2 years ago
- Reverse-HTTP Redirector via DigitalOcean Apps Platform☆29Updated last year