Aldenar / salt-malware-sources
Source files found after a recent hack of one of my machines, showing how the infection spreads itself and what it does, useful for analysis of other infected machines
☆13Updated 4 years ago
Related projects: ⓘ
- Execute tasks across SSH hosts using random selection☆17Updated 4 years ago
- Salesforce Policy Deviation Checker☆29Updated 3 years ago
- Going Florida on container keyring masks. A tool to demonstrate the ineffectivity containers have on isolating Linux Kernel keyrings.☆43Updated last year
- Hackers Don't Give A Shit☆14Updated 4 years ago
- Extract, defang, resolve names and IPs from text☆22Updated 8 months ago
- Tool to examine the behaviour of setuid binaries under constrained limits.☆62Updated 3 years ago
- Decryption utility for PGP Whole Disk Encryption☆18Updated 3 years ago
- Ansible scripts to build an attack box☆22Updated 5 years ago
- Provides access to libhashcat☆29Updated 5 months ago
- insject is a tool for poking at containers. It enables you to run an arbitrary command in a container or any mix of Linux namespaces.☆49Updated 2 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆30Updated 6 years ago
- Shell utility to list colorfully show what processes are listening on what ports.☆19Updated 5 years ago
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆37Updated 2 years ago
- vyos based isolation of networks☆11Updated 3 years ago
- Golang port for Metasploit's pattern_create and pattern_offset☆12Updated 3 years ago
- egrets monitors egress☆45Updated 4 years ago
- Collect autorun records from running system☆59Updated 2 years ago
- Things to know when DFIR occurs near a vault deployment.☆43Updated 6 years ago
- ☆16Updated 4 years ago
- Hostname filtering for arbitrary network protocols☆21Updated 3 months ago
- A collection of scripts for the purpose of gathering open source intelligence, to be presented at GrayHat, BSides Denver, and Information…☆24Updated 3 years ago
- Expand CIDRs or wrangle a list of IPs back to its smallest CIDR blocks possible☆10Updated 4 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆13Updated 2 years ago
- ☆43Updated this week
- Tachikoma is a security alerting framework for human beings☆22Updated 6 years ago
- nmap/ndiff based scanner with template based notification system in case of infrastructure changes☆18Updated 6 years ago
- Custom semgrep rules registry☆12Updated 2 years ago
- Kubernetes Unhinged Shell 😎☆46Updated last year
- ☆18Updated this week
- Register your Kubernetes IPs to monitor.shodan.io☆18Updated last year