Icons for a wide variety of social medias
☆62Feb 13, 2025Updated last year
Alternatives and similar repositories for readme-social-icons
Users that are interested in readme-social-icons are comparing it to the libraries listed below
Sorting:
- A template repository for building external data providers for Gatekeeper.☆12Aug 14, 2023Updated 2 years ago
- Threat Modeling with ATT&CK defines how to integreate MITRE ATT&CK® into your organization’s existing threat modeling methodology.☆12May 28, 2025Updated 9 months ago
- Yet another way to represent data in text. Addresses niche needs.☆11Mar 23, 2024Updated last year
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆23Jul 31, 2025Updated 7 months ago
- ☆12Dec 7, 2022Updated 3 years ago
- Go library to allow native inline hooking in windows at runtime☆14Feb 7, 2024Updated 2 years ago
- PowerShell module containing commands to easily interact with the Cybereason API.☆16Jan 4, 2026Updated 2 months ago
- ☆13Dec 27, 2023Updated 2 years ago
- .Net Assembly loader for the GMSAPasswordReader☆19Feb 15, 2023Updated 3 years ago
- A Python package to download Zone Files from the Centralized Zone Data Service hosted by ICAAN.☆17Jun 24, 2025Updated 8 months ago
- Automated evasive phishing infrastructure☆18Feb 11, 2023Updated 3 years ago
- Understanding the operation and limitations of Sysmon's events☆23Sep 15, 2022Updated 3 years ago
- A CALDERA Plugin Template☆20Jan 7, 2026Updated 2 months ago
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆27Nov 20, 2024Updated last year
- ☆24Jun 13, 2022Updated 3 years ago
- CryptoJoker is an open source ransomware written in C# created for education purposes only.☆22Jul 8, 2017Updated 8 years ago
- ProcExp Driver (Ab)use☆22Dec 28, 2022Updated 3 years ago
- The Boo Programming Language☆27Sep 8, 2008Updated 17 years ago
- My BloodHound custom queries☆26Jan 10, 2023Updated 3 years ago
- A proof-of-concept created for academic/learning purposes, demonstrating both local and remote use of VSTO "Add-In's" maliciously☆32Feb 3, 2023Updated 3 years ago
- CyCAT.org API back-end server including crawlers☆29Feb 4, 2023Updated 3 years ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆38Dec 4, 2024Updated last year
- ARDvark parses the Apple Remote Desktop (ARD) files to pull out application usage, user activity, and filesystem listings.☆36Jun 1, 2023Updated 2 years ago
- Timestomping module: overwrite file create/modify times in .NET (no pinvoke)☆27Dec 13, 2021Updated 4 years ago
- ☆31Mar 21, 2023Updated 2 years ago
- Ironsharp is a tool written in C# that detects CVEs caused by missing updates and privilege escalation vulnerabilities caused by misconfi…☆33Jun 28, 2022Updated 3 years ago
- A document tagging library☆33Mar 27, 2025Updated 11 months ago
- The main gravwell monorepo for ingesters and ingest code☆52Updated this week
- Python 3 script to dump/scrape/extract company employees from XING API☆39Feb 12, 2026Updated 3 weeks ago
- Agent Tesla Spyware C2 Exploit [PATCHED]☆32Aug 20, 2018Updated 7 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆38Aug 30, 2022Updated 3 years ago
- 「⚙️」Detect which native Windows API's (NtAPI) are being hooked☆39Dec 7, 2024Updated last year
- Command line tool for working with Panther rules and policies☆48Updated this week
- Modern Market Research with the Power of Command-Line☆45Sep 20, 2023Updated 2 years ago
- This code bypass AMSI by setting JE instruction to JNE in assembly of amsi.dll file☆37Mar 10, 2023Updated 3 years ago
- Threat Simulation Indexes☆39Jan 9, 2026Updated 2 months ago
- ☆40Feb 23, 2023Updated 3 years ago
- PoC showcasing new DarkGate Install Script retrieval technique via DNS TXT Record☆44Dec 15, 2023Updated 2 years ago
- Bypasses AMSI protection through remote memory patching and parsing technique.☆54May 12, 2025Updated 9 months ago