CatherineFramework / catherine
The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.
☆16Updated 11 months ago
Alternatives and similar repositories for catherine:
Users that are interested in catherine are comparing it to the libraries listed below
- MacroExploit use in excel sheet☆20Updated last year
- Bash tool used for proactive detection of malicious activity on macOS systems.☆35Updated last year
- ☆27Updated last year
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆17Updated 2 years ago
- A tool that adds reproducible UUIDs to YARA rules☆13Updated 10 months ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 8 months ago
- CIS Benchmark testing of Windows SIEM configuration☆44Updated last year
- TCP Data Transfer Tool By ClumsyLulz☆12Updated 2 years ago
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Updated last year
- Enumeration & fingerprint tool☆24Updated last year
- Simple Shellcode Runner in Rust Language☆17Updated last year
- ☆12Updated 4 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Updated 3 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆9Updated 2 years ago
- Searching .evtx logs for remote connections☆23Updated last year
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- EventLogSilencer is a PowerShell script designed for disable Windows Event Logging☆15Updated last year
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- Official repository for the Advanced Software Exploitation (ASE) course☆20Updated 6 years ago
- Monitor your target continuously for new subdomains!☆26Updated 2 years ago
- Python Prototype Scripts to Exploit or Discover Network vulnerabilities and misconfiguration.☆18Updated 11 months ago
- ☆21Updated last year
- ☆24Updated last year
- ☆14Updated 2 years ago
- ☆16Updated last year
- ☆13Updated last year
- A Post-exploitation Toolset for Interacting with the Microsoft Graph API☆16Updated last year
- ☆12Updated 2 years ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated 2 years ago