EyupErgin / HuntRthysLinks
Specific C2 Detection Tool Written To Detect C2 Servers From Rhadamanthys Stealer Malware.
☆18Updated last year
Alternatives and similar repositories for HuntRthys
Users that are interested in HuntRthys are comparing it to the libraries listed below
Sorting:
- CLI-based 802.11 Rogue (Fake) AP & Hidden AP Spotter☆12Updated last month
- Chista | Open Threat Intelligence Framework☆59Updated last year
- Red Team Guides☆139Updated last year
- This repository contains indicators of compromise (IOCs) of our various investigations.☆291Updated last week
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆147Updated last year
- "Sucosh" is an automated Source Code vulnerability scanner and assessment framework for Python(Flask-Django) & NodeJs capable of performi…☆37Updated last year
- Just an AV slayer. Nothing special ;)☆217Updated 2 years ago
- Windows for Red Teamers☆126Updated 3 years ago
- A collection of red teaming and adversary emulation related tools, scripts, techniques, notes, etc☆314Updated last year
- Just some lists of Malware Configs☆172Updated 8 months ago
- Collection of OPSEC Tradecraft and TTPs for Red Team Operations☆309Updated last week
- A tool matrix for Russian APTs based on the Ransomware Tool Matrix☆221Updated last month
- ☆13Updated 2 years ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆68Updated last year
- Lockbit, URSIF, BlackBasta etc.☆134Updated 4 months ago
- A suite of tools to disrupt campaigns using the Sliver C2 framework.☆280Updated 2 years ago
- Abusing Reddit API to host the C2 traffic, since most of the blue-team members use Reddit, it might be a great way to make the traffic lo…☆269Updated 2 years ago
- Google Calendar RAT is a PoC of Command&Control over Google Calendar Events☆252Updated last month
- A RedTeam Toolkit☆407Updated last month
- Malware vulnerability intel tool for third-party attackers☆122Updated 11 months ago
- Some Pentesters, Security Researchers, Red Teamers which i learned from them a lot...☆112Updated last year
- An Archive of Ransomware Notes Past and Present Collected by Zscaler ThreatLabz☆378Updated 3 weeks ago
- Command & Control-Framework created for collaboration in python3☆319Updated 2 years ago
- VM Lab for security☆10Updated last year
- ScrapPY is a Python utility for scraping manuals, documents, and other sensitive PDFs to generate wordlists that can be utilized by offen…☆213Updated 4 months ago
- Malware Checker Tool generates an HTML report by comparing Hashes, Ip Addresses and URL Addresses through the VirusTotal database.☆36Updated 3 years ago
- OSINT - Data Visualization - Blockchain - Awareness - Scam☆44Updated last year
- ☆374Updated this week
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆64Updated last year
- Redeye is a tool intended to help you manage your data during a pentest operation☆466Updated last year