CrowdStrike / Tortilla
☆293Updated 8 years ago
Alternatives and similar repositories for Tortilla:
Users that are interested in Tortilla are comparing it to the libraries listed below
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆522Updated 8 years ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆372Updated 2 years ago
- Fake sshd that logs ip addresses, usernames, and passwords.☆194Updated 8 years ago
- Panic button for protection against cold boot attacks☆141Updated 3 years ago
- A rogue-USB-device defeat program for Windows.☆188Updated 2 years ago
- A honeypot for malware that propagates via USB storage devices☆96Updated 10 years ago
- Cisco Talos MBR Filter Driver☆340Updated 7 years ago
- Script lets you gather malicious software and c&c servers from open source platforms like Malshare, Malcode, Google, Cymon - vxvault, cyb…☆37Updated 5 years ago
- Veil-Pillage is a post-exploitation framework that integrates with Veil-Evasion.☆159Updated 9 years ago
- ☆425Updated 7 years ago
- Tallow - Transparent Tor for Windows☆534Updated 3 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆144Updated 9 years ago
- A tool for automated MITM attacks on SSL connections.☆556Updated 7 years ago
- EternalRocks worm☆458Updated 7 years ago
- Passive Vulnerability Auditor☆133Updated 8 years ago
- for the louise☆242Updated 4 years ago
- This is a mini-firewall that completely isolates a target device from the local network.☆306Updated 11 years ago
- Detect and prevent KRACK attacks in your network☆181Updated 7 years ago
- A collection of tools for dealing with TrickBot☆199Updated 7 years ago
- PwnSTAR (Pwn SofT-Ap scRipt) - for all your fake-AP needs!☆255Updated 7 years ago
- A web front-end for password cracking and analytics☆625Updated 3 years ago
- Cross-platform, open-source shellbag parser☆150Updated 2 years ago
- VirusTotal tools☆90Updated 4 years ago
- Maltego Penetration Testing Transforms☆367Updated 5 years ago
- Simple Bash Rasomware for use in Cyber Exercises☆116Updated 9 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- Code written as part of our various malware investigations☆395Updated 3 months ago
- The TrustedSec Attack Platform is a reliable method for droppers on an infrastructure in order to ensure established connections to an or…☆382Updated 2 years ago
- 👁🗨 This script will simulate fake processes of analysis sandbox/VM software that some malware will try to avoid.☆141Updated last year
- The Credential Mapper☆441Updated 7 years ago