Threat-Surface helps with daily tracking of exposed servers, open ports, and infrastructure used by threat actors.
☆53Jan 16, 2026Updated 3 months ago
Alternatives and similar repositories for Threat-Surface
Users that are interested in Threat-Surface are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Autonomous Multi-Agent Based Red Team Testing Service / AI hacker☆20Sep 15, 2025Updated 7 months ago
- Python-based web scraper for a darkweb marketplace on the Tor network.☆40Sep 12, 2024Updated last year
- ☆24Nov 18, 2023Updated 2 years ago
- A tool to identify and remediate common misconfigurations in Active Directory Certificate Services☆18Jan 13, 2024Updated 2 years ago
- Develop macOS apps on Windows with seamless cross-platform tools.☆16Jun 5, 2025Updated 11 months ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- A proof-of-concept to demonstrate randomized execution paths and their impact on call stack signatures — ideal for EDR testing, behavior-…☆24Jan 17, 2026Updated 3 months ago
- RDE1 (Rusty Data Exfiltrator) is client and server tool allowing auditor to extract files from DNS and HTTPS protocols written in Rust. �…☆41Apr 4, 2025Updated last year
- ESXi Cyber Security Incident Response Script☆27Sep 4, 2024Updated last year
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆14Jul 9, 2023Updated 2 years ago
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆28Jul 15, 2024Updated last year
- Cortex EDR Ransomware protection Bypass☆27Feb 8, 2025Updated last year
- Dreg's setup for lldb reversing. The simplest and easiest possible, without scripting. lldb debugging setup.☆14May 2, 2024Updated 2 years ago
- just for fun☆18Jan 21, 2025Updated last year
- Another Portable Executable files analysing stuff☆21May 28, 2011Updated 14 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Direct syscalls Injection to bypass AV/EDR☆11May 18, 2024Updated last year
- ☆23Feb 14, 2023Updated 3 years ago
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆24Oct 23, 2021Updated 4 years ago
- Disk Image Mounting Script☆11Jan 22, 2026Updated 3 months ago
- ☆12Apr 20, 2025Updated last year
- Thor Artifacts for Velociraptor☆19Dec 2, 2025Updated 5 months ago
- ICSGoat: A Damn Vulnerable ICS Infrastructure☆32Aug 26, 2024Updated last year
- iban üzerinden bilgi toplamak için işlemi basitleştiren basit python kodu☆12Apr 6, 2023Updated 3 years ago
- Yet another machine learning-based WAF research☆26Jun 21, 2022Updated 3 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- a tiny code that performs kernel-mode read/write using CVE-2023-38817.☆18Mar 28, 2025Updated last year
- Malware that we analyzed on our site.☆26Nov 12, 2025Updated 5 months ago
- Plaguards: Open Source PowerShell Deobfuscation and IOC Detection Engine for Blue Teams. [Presented at Black Hat Asia and USA 2025 Arsena…☆17Jan 4, 2026Updated 4 months ago
- Find subdomains by searching public certificate records☆16Jun 11, 2024Updated last year
- Scripts to for ready-to-use Velociraptor instance deployment in Azure☆14Jun 27, 2023Updated 2 years ago
- ☆12Mar 28, 2026Updated last month
- An OSINT tool for searching DuckDuckGo via Tor using search dorks.☆22May 3, 2025Updated last year
- Implements dynamic Windows API resolution via hashing techniques to evade detection. Inspired by techniques mapped to MITRE ATT&CK T1055…☆18Jan 3, 2025Updated last year
- SMTP Open Relay Exploitation☆16Nov 23, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- The materials of the "Hypervisors for Hackers: Security from the Hardware Up" class held at Global Cybersecurity Camp 2026 Vietnam.☆61Mar 4, 2026Updated 2 months ago
- The Art of Pivoting - Techniques for Intelligence Analysts to Discover New Relationships in a Complex World☆170Apr 11, 2026Updated 3 weeks ago
- Welcome to the SEKOIA.IO Community repository!☆184Apr 29, 2026Updated last week
- A custom implementation of GetProcAddress, often used in malware to evade detection by bypassing standard API resolution methods☆18Dec 27, 2024Updated last year
- Full reversing of the Microsoft Auxiliary Windows API Library and ported to C☆24Dec 17, 2024Updated last year
- Security automation with n8n ideas: 100+ Red/Blue/AppSec workflows, integrations, and ready-to-run playbooks.☆100Sep 20, 2025Updated 7 months ago
- BasicLDR: A Reflective DLL Loader☆14Jun 11, 2024Updated last year