0xHossam / InviGuard
Advanced network security tool for real-time threat detection and C2 communication prevention. Features 70+ detection modules, IOC integration, customizable alerts, and a dashboard with analytics. API-ready for seamless security solution integration.
☆12Updated 10 months ago
Alternatives and similar repositories for InviGuard:
Users that are interested in InviGuard are comparing it to the libraries listed below
- PDump is a project for dumping leaked credentials from DEHASHED☆16Updated last year
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆44Updated last year
- Discord C2 Profile for Mythic☆28Updated 2 months ago
- ☆27Updated last year
- quick and dirty proof-of-concept to hide shells in images☆49Updated 9 months ago
- Make an Linux Kernel rootkit visible again.☆50Updated last month
- Deathstar is an Empire plugin that automates gaining Domain and/or Enterprise Admin rights in Active Directory environments using common …☆18Updated last month
- exfiltration/infiltration toolkit☆23Updated last year
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- Items related to the RedELK workshop given at security conferences☆29Updated last year
- ☆34Updated last year
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated 2 years ago
- ☆14Updated 3 months ago
- ☆52Updated last year
- Situational Awareness script to identify how and where to run implants☆50Updated 4 months ago
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆29Updated this week
- GetSystem-LCI is a PowerShell script to escalate privileges from Administrator to NT AUTHORITY\SYSTEM by abusing LanguageComponentsInstal…☆34Updated 5 months ago
- ☆53Updated 4 months ago
- HashKitty is a user-friendly cross-platform Python wrapper for Hashcat designed to provide an easy password cracking experience for both …☆41Updated 9 months ago
- Create PDFs with HTML smuggling attachments that save on opening the document.☆29Updated last year
- POC for CVE-2024-3183 (FreeIPA Rosting)☆20Updated 8 months ago
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆25Updated last year
- A repository with my code snippets for research/education purposes.☆50Updated last year
- Abusing Remote Windows SMB Shares for Fun and Pen Testing☆15Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆42Updated last month
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆33Updated last year
- MacroExploit use in excel sheet☆20Updated last year
- IAT Unhooking proof-of-concept☆29Updated last year
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆39Updated 2 years ago
- This map lists the essential techniques to bypass anti-virus and EDR☆15Updated last year