CatherineFramework / catherineLinks
The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.
☆16Updated last year
Alternatives and similar repositories for catherine
Users that are interested in catherine are comparing it to the libraries listed below
Sorting:
- MacroExploit use in excel sheet☆20Updated last year
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- TCP Data Transfer Tool By ClumsyLulz☆12Updated 2 years ago
- Official repository for the Advanced Software Exploitation (ASE) course☆20Updated 6 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated 10 months ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆35Updated 2 years ago
- ☆9Updated last month
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆18Updated 2 years ago
- ☆28Updated last year
- Enumeration & fingerprint tool☆24Updated last year
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆19Updated last year
- PDump is a project for dumping leaked credentials from DEHASHED☆16Updated last year
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆15Updated 10 months ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Updated 4 years ago
- Central IoC scanner based on Loki☆20Updated 3 years ago
- lightweight http redirector written in nim☆11Updated 2 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Updated 3 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Searching .evtx logs for remote connections☆23Updated last year
- A tool that adds reproducible UUIDs to YARA rules☆13Updated last year
- ☆12Updated 3 years ago
- ☆12Updated 3 years ago
- A Python script to find tenant id an region from a list of domain names.☆14Updated 4 months ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated 2 years ago
- ☆12Updated 4 years ago
- ☆22Updated last year
- Red Team Infrastructure: Covenant C2☆10Updated 5 years ago
- ☆12Updated 2 years ago
- Red Team Projects with chat.openai.com.☆17Updated 2 years ago