EyupErgin / HuntRisePro
Specific C2 Detection Tool Written To Detect C2 Servers From RisePro Stealer Malware.
☆10Updated last year
Alternatives and similar repositories for HuntRisePro:
Users that are interested in HuntRisePro are comparing it to the libraries listed below
- ☆9Updated 2 years ago
- ☆24Updated 2 years ago
- This is a working variant of the Mirai IOT botnet☆13Updated 2 years ago
- Hive v5 file decryption algorithm☆34Updated 2 years ago
- Nexus of Android banking Trojans☆15Updated last year
- ☆13Updated last week
- Method of finding interesting domains using keywords + JARMs☆13Updated 2 years ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated last year
- Real-time updated lists of U.S. GovCloud IP ranges on Amazon AWS, Microsoft Azure, Google GCP☆17Updated 3 months ago
- Machine Learning basics with phishing dataset☆10Updated 3 years ago
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆32Updated 2 years ago
- ☆17Updated last year
- BlackHeart is a simple python script to generate powershell scripts that demonstrate reverse shell gaining without Microsoft Defender res…☆31Updated 11 months ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆35Updated last year
- razorAP, Bash and Python tool used to generate Fake Access Points for Wi-Fi networks with 802.1X authentication.☆20Updated 6 months ago
- Lena's scripts/code/resources for malware analysis☆25Updated 9 months ago
- DataReaper is a powerful Python tool designed to harvest data from publicly accessible HTTP servers. It combines the capabilities of Shod…☆11Updated last year
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆12Updated 2 years ago
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆16Updated 3 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- Tactics, Techniques, and Procedures☆25Updated 2 months ago
- ☆24Updated last year
- RedBlock is an Nginx module designed for offensive security operations and red teaming. This module empowers security professionals to ea…☆20Updated last year
- Repository for archiving Cobalt Strike configuration☆29Updated this week
- Central IoC scanner based on Loki☆20Updated 3 years ago
- ☆19Updated last year
- Classic Web shell upload techniques & Web RCE techniques☆27Updated 4 months ago
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆18Updated last year
- Static and Dynamic Analysis of Malware Samples☆11Updated 5 years ago
- With the help of this docker image, you can easily access PEzor on your system!☆15Updated 3 years ago