Basic network sec tool for real-time threat detection and C2 communication prevention. Features 70+ detection modules, IOC integration, customizable alerts, and a dashboard with analytics. API-ready for seamless security solution integration.
☆17Jun 11, 2024Updated last year
Alternatives and similar repositories for InviGuard
Users that are interested in InviGuard are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Projected developed for fun only that simulates APT 29 and Lockbit TTPs, showcasing phishing, ISO execution, and DLL proxying for persist…☆62May 3, 2024Updated last year
- Modified version of Process monitor that bypasses procmon detection for anti-debuggers☆24May 6, 2024Updated last year
- Offensive toolkit and BloodHound graph creator for DPAPI blobs and master key files☆15Jan 10, 2026Updated 3 months ago
- Automate Cobalt Strike keystore file for Teamserver SSL.☆11Feb 1, 2022Updated 4 years ago
- C2 redirector as a web API☆10May 22, 2021Updated 4 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Nice try reading NTDLL from disk, nerd.☆19Apr 18, 2022Updated 4 years ago
- Command-line tool to search for malware samples in various repositories☆13Mar 3, 2022Updated 4 years ago
- LuLu is the free macOS firewall☆12Jun 28, 2022Updated 3 years ago
- ☆19Nov 28, 2024Updated last year
- reverse engineering random malwares☆23Mar 12, 2026Updated last month
- ⚠️ Malware Development training ⚠️☆41Feb 24, 2025Updated last year
- Learning progress in CyberTalents Blue Team Scholarship 2023. Write-ups, solutions, and notes for challenges & topics. Join my cybersecur…☆25Sep 28, 2023Updated 2 years ago
- This project is an EDRSandblast fork, adding some features and custom pieces of code.☆25Sep 29, 2023Updated 2 years ago
- A powerful macOS triage collection tool designed for forensic analysis. It gathers critical system artifacts such as FSEvents, Spotlight,…☆42Oct 24, 2025Updated 6 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- AWS X-Ray for Covert Command & Control☆46Oct 13, 2025Updated 6 months ago
- HTML smuggling is not an evil, it can be useful☆14Jan 28, 2023Updated 3 years ago
- Deceiving the Tapo app by impersonating a TP-Link device☆12Dec 11, 2023Updated 2 years ago
- Kali in a Box - Containerized and fully operational within your Browser☆13Nov 17, 2025Updated 5 months ago
- Custom dyld version inherited from original Apple dyld implementation☆23Apr 27, 2024Updated 2 years ago
- CVE-2020-16899 - Microsoft Windows TCP/IP Vulnerability Detection Logic and Rule☆20Oct 19, 2020Updated 5 years ago
- Playing with packets in C#☆15Aug 16, 2024Updated last year
- 🗄️ Collection and organization of information ℹ️☆19Updated this week
- This project provides a web interface to send a payload via SMS, display device information upon successful delivery, and control the dev…☆23Mar 26, 2026Updated last month
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Archive of leaked Equation Group materials☆24Aug 17, 2016Updated 9 years ago
- Butler 是一个用于自动化服务管理和任务调度的工具项目。☆16Apr 19, 2026Updated last week
- Enhanced Stealth Tunnel for Linux (Red Team Ops on compromised machine with root)☆14Jun 10, 2025Updated 10 months ago
- Osmocom Config Files for Osmo Core Network☆16May 23, 2020Updated 5 years ago
- A post-exploitation toolkit to simulate the weaponization and detection of native Windows binaries based on LOLBas framework.☆33Jun 11, 2023Updated 2 years ago
- Repository to gather the .NET malware I will be developing☆18Mar 7, 2026Updated last month
- ☕ Manage and create a WiFi Hotspot with PowerShell 📶☆17Dec 25, 2023Updated 2 years ago
- A public repository of MITRE ATT&ACK TTP mappings by BushidoUK for OSINT reports that lack a section breaking down the TTPs.☆27Mar 20, 2025Updated last year
- Охотник (Hunter) is a simple Adversary Simulation tool developed for achieves stealth through API unhooking, direct and indirect syscalls…☆95Apr 23, 2025Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Penetration Testing Interview Questions☆55Apr 15, 2022Updated 4 years ago
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆13Dec 15, 2022Updated 3 years ago
- Beacon Object File allowing creation of Beacons in different sessions.☆84May 23, 2022Updated 3 years ago
- Proof of Concept for manipulating the Kernel Callback Table in the Process Environment Block (PEB) to perform process injection and hijac…☆274Oct 31, 2024Updated last year
- Dons Js Scanner is a sleek command-line tool that hunts for hidden treasures—API keys, credentials, and secrets—lurking in the JavaScript…☆87Apr 1, 2026Updated last month
- ☆40May 21, 2022Updated 3 years ago
- Build pipeline for Fedora CoreOS☆67Updated this week