7RU7H / ShadowLinks
The long shadow to emerge as other Git repositories
☆18Updated 11 months ago
Alternatives and similar repositories for Shadow
Users that are interested in Shadow are comparing it to the libraries listed below
Sorting:
- A collection of tools adversaries commonly use in an attack.☆14Updated 7 months ago
- Exploit for win10 SMB3.1☆17Updated 5 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Updated 4 years ago
- Automated Payload Test Controller☆10Updated 8 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆18Updated 4 years ago
- Tool to crawl, visualize and interact with SQL server links in a d3 graph to help in your red/blue/purple/.../risk assessments pentest …☆19Updated 4 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 5 years ago
- IDS/IPS malware download evasion☆15Updated 6 years ago
- Identify common attack paths to get Domain Administrator☆22Updated 5 years ago
- Spin up a reverse proxy quickly on Heroku☆14Updated 4 years ago
- just manipulatin these here tokens yes sir nothing weird☆22Updated 3 years ago
- parsers to make life easier☆13Updated 4 years ago
- Some Pentesting Scripts☆11Updated 3 years ago
- Python script that automate the process of generating various reverse shells.☆15Updated 4 years ago
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect tha…☆16Updated last year
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆30Updated 3 years ago
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online ma…☆13Updated 4 years ago
- Kibana app for RedELK☆17Updated 2 years ago
- Data EXfiltration TestER☆21Updated 5 years ago
- Exfiltrate data with DNS queries. Based on CertUtil and NSLookup.☆22Updated last year
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Updated 4 years ago
- Exactly what it sounds like, which is something rad☆22Updated 2 years ago
- Burp extension for automated handling of CSRF tokens☆16Updated 7 years ago
- ☆17Updated 3 years ago
- A basic proxylogon scanner☆27Updated 3 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- Web access logs analyzer - provides an insight on how remote hosts behave☆15Updated 3 years ago
- ☆17Updated 5 years ago
- Exploit PoC for CVE's and non CVE's alike☆22Updated 4 years ago
- Do the unexpected with AD GPO processing☆9Updated 6 years ago