EyupErgin / HuntRthysLinks
Specific C2 Detection Tool Written To Detect C2 Servers From Rhadamanthys Stealer Malware.
☆18Updated last year
Alternatives and similar repositories for HuntRthys
Users that are interested in HuntRthys are comparing it to the libraries listed below
Sorting:
- Red Team Guides☆140Updated last year
- CLI-based 802.11 Rogue (Fake) AP & Hidden AP Spotter☆12Updated 2 months ago
- "Sucosh" is an automated Source Code vulnerability scanner and assessment framework for Python(Flask-Django) & NodeJs capable of performi…☆38Updated last year
- Chista | Open Threat Intelligence Framework☆59Updated last year
- List of Command&Control (C2) software☆44Updated 2 years ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146Updated last year
- My public notes about offensive security☆163Updated last month
- Just some lists of Malware Configs☆172Updated 9 months ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆84Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆96Updated 2 years ago
- Abusing Reddit API to host the C2 traffic, since most of the blue-team members use Reddit, it might be a great way to make the traffic lo…☆268Updated 2 years ago
- Windows for Red Teamers☆126Updated 3 years ago
- An Interface for AI built for cybersecurity professionals☆92Updated 8 months ago
- Various PowerShell scripts that may be useful during red team exercise☆21Updated 3 years ago
- Automate Scoping, OSINT and Recon assessments.☆97Updated last week
- ☆65Updated 2 years ago
- This repository contains indicators of compromise (IOCs) of our various investigations.☆292Updated last month
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆68Updated last year
- Hide an IP address in scripts using hex/decimal/octal conversions☆71Updated 6 months ago
- ☆91Updated 2 years ago
- Just an AV slayer. Nothing special ;)☆218Updated 2 years ago
- Nuclei templates for honeypots detection.☆195Updated last year
- A collection of red teaming and adversary emulation related tools, scripts, techniques, notes, etc☆316Updated last year
- ☆13Updated 2 years ago
- Pentest/Red Team: Resources, repos and scripts.☆75Updated last month
- Red Teaming tools and techniques☆55Updated 2 years ago
- ThreatTracer - A python Script to identify CVE by name & version and more by @FR13ND0x7F☆138Updated 4 months ago
- Cyber Security Awareness Framework (CSAF)☆100Updated 7 months ago
- ☆48Updated 4 years ago
- An in-depth guide to help people who are new to penetration testing or red teaming and are looking to gain an overview of the penetration…☆145Updated 9 months ago