EyupErgin / HuntRiseProLinks
Specific C2 Detection Tool Written To Detect C2 Servers From RisePro Stealer Malware.
☆13Updated last year
Alternatives and similar repositories for HuntRisePro
Users that are interested in HuntRisePro are comparing it to the libraries listed below
Sorting:
- ☆24Updated 3 years ago
- Method of finding interesting domains using keywords + JARMs☆13Updated 2 years ago
- Real-time updated lists of U.S. GovCloud IP ranges on Amazon AWS, Microsoft Azure, Google GCP☆18Updated 10 months ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆36Updated 2 weeks ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated last year
- It was developed to speed up the processes of SOC Analysts during analysis☆46Updated last year
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆17Updated 3 years ago
- CloudDefense.ai is an automated web application security testing tool that audits your web applications by checking for vulnerabilities l…☆49Updated 8 months ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆28Updated 2 years ago
- All docker botnets acrued since early 2018 .... as of 2025 there is a stall in actors...tbd if updates beyond JAN 2025 will continue.☆22Updated 9 months ago
- A scanner that files with compromised or untrusted code signing certificates written in python.☆64Updated 2 years ago
- ☆42Updated 6 months ago
- Fresh malware samples caught in the wild daily from random places. 🎣☆19Updated 6 years ago
- ☆10Updated 2 years ago
- Repository of tools used in my blog☆51Updated last year
- Malware campaigns and APTs research by BlackArrow☆19Updated 5 years ago
- Scrape Pastebin API to collect daily pastes, setup a wordlist and be alerted by email when you have a match.☆50Updated 8 months ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Updated 3 years ago
- ☆16Updated 2 years ago
- Shock the shell! Exploit many injection method for shellshock☆18Updated 7 years ago
- Script to chain search parameters for MalwareBazaar☆12Updated 8 months ago
- IOC Data Obtained From Karakurt Hacking Team's Internal Infrastructure☆33Updated 3 years ago
- ☆19Updated last year
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Updated 3 years ago
- PoC Dumb Ransomware payload. Any malicious use of this code is strictly prohibited.☆28Updated 3 months ago
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆31Updated 3 years ago
- Sp00fer blog post -☆25Updated 3 years ago
- This is a working variant of the Mirai IOT botnet☆14Updated 2 years ago
- Nexus of Android banking Trojans☆15Updated 2 years ago
- Notes and IoCs of fresh malware☆59Updated last year