EyupErgin / HuntRiseProLinks
Specific C2 Detection Tool Written To Detect C2 Servers From RisePro Stealer Malware.
☆13Updated last year
Alternatives and similar repositories for HuntRisePro
Users that are interested in HuntRisePro are comparing it to the libraries listed below
Sorting:
- ☆24Updated 3 years ago
- Method of finding interesting domains using keywords + JARMs☆13Updated 2 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆36Updated 2 years ago
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆17Updated 3 years ago
- Script to chain search parameters for MalwareBazaar☆12Updated 8 months ago
- ☆10Updated 2 years ago
- ☆19Updated last year
- CloudDefense.ai is an automated web application security testing tool that audits your web applications by checking for vulnerabilities l…☆49Updated 8 months ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆28Updated 2 years ago
- Repository of tools used in my blog☆52Updated last year
- Real-time updated lists of U.S. GovCloud IP ranges on Amazon AWS, Microsoft Azure, Google GCP☆18Updated 9 months ago
- ☆42Updated 5 months ago
- It was developed to speed up the processes of SOC Analysts during analysis☆47Updated last year
- Sp00fer blog post -☆25Updated 3 years ago
- ☆16Updated 2 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 5 years ago
- Zeroday Microsoft Exchange Server checker (Virtual Patching checker)☆70Updated 2 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated last year
- Machine Learning basics with phishing dataset☆11Updated 4 years ago
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆17Updated 3 years ago
- PoC Dumb Ransomware payload. Any malicious use of this code is strictly prohibited.☆28Updated 2 months ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆14Updated 4 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Updated 3 years ago
- Sources Codes of many Office Malwares☆17Updated 3 years ago
- Fresh malware samples caught in the wild daily from random places. 🎣☆19Updated 6 years ago
- Simple POC of Voice C2 using Speech Recognition☆13Updated 3 years ago
- MSFVenom Powershell Stager Encoder & Generator☆16Updated 4 years ago
- IoT Malware Similarity Analysis Platform☆44Updated 3 years ago
- Collaborative malware exchange repository.☆35Updated 10 months ago
- Simple C2 over the Trello API☆39Updated 2 years ago