DidierStevens / FalsePositives
Tools that trigger False Positive AV alerts
☆44Updated last month
Alternatives and similar repositories for FalsePositives:
Users that are interested in FalsePositives are comparing it to the libraries listed below
- Tools for playing w/ CobaltStrike config - extractin, detection, processing, etc...☆27Updated last year
- aggregated repo for all conferences and talks I am giving☆17Updated 3 years ago
- Continuous kerberoast monitor☆44Updated last year
- ☆15Updated 3 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Repository for LNK stuff☆29Updated 2 years ago
- C# User Simulation☆32Updated 2 years ago
- Tools for offensive security of NetBackup infrastructures☆38Updated last year
- A fast wordlist to nthash converter☆21Updated 3 years ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆53Updated 2 years ago
- Reads and prints information from the website MalAPI.io☆38Updated 3 years ago
- ☆49Updated last year
- Reproducible and extensible BloodHound playbooks☆42Updated 5 years ago
- Docker container that has all the CLI tooling for binary exploitation (thanks to @LiveOverflow)☆24Updated last year
- Triaging Windows event logs based on SANS Poster☆38Updated 2 years ago
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago
- Red team oriented key finder and correlator☆16Updated 11 months ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆49Updated 3 months ago
- ☆37Updated 3 years ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated last year
- Slides for the talk we presented as UniPi at DefCon's Red Team Village☆23Updated 2 years ago
- self-hosted Azure OSINT tool☆25Updated 4 months ago
- ☆41Updated 2 years ago
- AutoPoC Generator HoneyPoC☆34Updated 6 months ago
- Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable…☆17Updated 3 years ago
- BloodCheck enables Red and Blue Teams to manage multiple Neo4j databases and run Cypher queries against a BloodHound dataset.☆17Updated 3 years ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated last year
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆20Updated 9 months ago
- ☆15Updated 2 years ago
- Python tool to find vulnerable AD object and generating csv report☆14Updated 2 years ago