CatherineFramework / catherine
The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.
☆16Updated last year
Alternatives and similar repositories for catherine:
Users that are interested in catherine are comparing it to the libraries listed below
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 8 months ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆35Updated last year
- ☆12Updated 4 years ago
- ☆21Updated last year
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- Central IoC scanner based on Loki☆20Updated 3 years ago
- ☆27Updated last year
- TCP Data Transfer Tool By ClumsyLulz☆12Updated 2 years ago
- MacroExploit use in excel sheet☆20Updated last year
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆15Updated 8 months ago
- A C# Tool to gather information about email breaches☆14Updated last year
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆19Updated last year
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Updated 3 years ago
- Enumeration & fingerprint tool☆24Updated last year
- A tool that adds reproducible UUIDs to YARA rules☆13Updated 11 months ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- Simple Shellcode Runner in Rust Language☆17Updated last year
- ☆12Updated 2 years ago
- ☆32Updated 2 years ago
- Create PDFs with HTML smuggling attachments that save on opening the document.☆29Updated last year
- PDump is a project for dumping leaked credentials from DEHASHED☆16Updated last year
- With the help of this docker image, you can easily access PEzor on your system!☆15Updated 3 years ago
- Official repository for the Advanced Software Exploitation (ASE) course☆20Updated 6 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Updated 4 years ago
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Updated last year
- CIS Benchmark testing of Windows SIEM configuration☆44Updated last year
- An exotic service bruteforce tool.☆12Updated 2 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆17Updated 2 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆16Updated 4 years ago
- shellDAVpass application is the Open-Source project, the main idea of which is to bypass the defender and AntiVirus detections to conduct…☆25Updated 11 months ago