Echidna-Pentest / Echidna
☆60Updated 10 months ago
Alternatives and similar repositories for Echidna:
Users that are interested in Echidna are comparing it to the libraries listed below
- Generator of static files(csv, jpeg, png, pdf) for testing file upload. It can generate csv and png files of any number of bytes!☆65Updated last month
- Yet Another Memory Analyzer for malware detection☆179Updated 9 months ago
- RustyBlue is a rust implementation of DeepblueCLI, a forensics log analyzer for finding evidence of compromise from windows event logs.☆72Updated 2 years ago
- KaliPAKU is a training tool for penetration testing using Kali Linux. It is designed to help security professionals and engineers improve…☆35Updated last year
- Automatically update IoC for lucky visitor scam☆26Updated this week
- Hands-on Exercises for "Dangerous attack paths: Modern Development Environment Security - Devices and CI/CD pipelines"☆45Updated 2 years ago
- PowerShell Script Analyzer☆68Updated last year
- C2 Automation using Linode☆80Updated 2 years ago
- a map for the azure oriented pentests☆67Updated last year
- PAKURI-THON is a tool that supports pentesters with various pentesting tools and C4 server (command & control and chat & communication se…☆27Updated 2 years ago
- Simple SQL Injection Lab: Hands-on guide and Docker setup for exploring MySQL and PostgreSQL injection techniques☆30Updated 2 years ago
- Memory Forensic System on Cloud☆89Updated last year
- Integrated Security Testing Environment for Web Applications as Burp Extension.☆62Updated last year
- ☆89Updated last week
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆118Updated 11 months ago
- ☆58Updated last year
- Core A2P2V functionality (command line based)☆67Updated 10 months ago
- Bash Script to extract GNU/Linux forensic artifacts for digital forensic analysis and incident response.☆43Updated last year
- 👻 [PoC] CSV+ 0.8.0 - Arbitrary Code Execution (CVE-2022-21241)☆24Updated 3 years ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆101Updated last year
- https://lolad-project.github.io/☆74Updated 2 months ago
- Some of my rough notes for Docker threat detection☆47Updated last year
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆65Updated 2 years ago
- A list of awesome penetration testing tools and resources.☆80Updated last year
- This is the LLM integration app that contains the vulnerability; please use it to verify the vulnerability of the LLM integration app.☆45Updated last month
- MS Graph Commands and Tools for Blue Teamers☆49Updated last year
- Lazarus analysis tools and research report☆55Updated last year
- A Slack bot phishing framework for Red Teaming exercises☆166Updated 10 months ago
- ☆41Updated 2 years ago
- cheat sheet for penetration testing (Japanese) 🐉☆82Updated 4 years ago