EyupErgin / HuntRthysLinks
Specific C2 Detection Tool Written To Detect C2 Servers From Rhadamanthys Stealer Malware.
☆18Updated 2 years ago
Alternatives and similar repositories for HuntRthys
Users that are interested in HuntRthys are comparing it to the libraries listed below
Sorting:
- CLI-based 802.11 Rogue (Fake) AP & Hidden AP Spotter☆13Updated 3 months ago
- Chista | Open Threat Intelligence Framework☆61Updated last year
- "Sucosh" is an automated Source Code vulnerability scanner and assessment framework for Python(Flask-Django) & NodeJs capable of performi…☆38Updated last year
- Red Team Guides☆143Updated last year
- This repository contains indicators of compromise (IOCs) of our various investigations.☆311Updated last month
- ☆13Updated 2 years ago
- IOC Data Obtained From Karakurt Hacking Team's Internal Infrastructure☆34Updated 3 years ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆68Updated last year
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146Updated last year
- Just some lists of Malware Configs☆173Updated 11 months ago
- Windows for Red Teamers☆126Updated 3 years ago
- Shortemall is a Python-based tool that automates the process of scanning hidden content of Short URLs.☆90Updated last year
- ⚠️ Malware Development training ⚠️☆39Updated 9 months ago
- A collection of red teaming and adversary emulation related tools, scripts, techniques, notes, etc☆318Updated last year
- Free training course offered at Hack Space Con 2023☆138Updated 2 years ago
- ☆65Updated 2 years ago
- Just an AV slayer. Nothing special ;)☆216Updated 3 years ago
- Finds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files.☆101Updated last year
- Automate Scoping, OSINT and Recon assessments.☆98Updated last month
- Web Hacking and Red Teaming MindMap☆78Updated last month
- Command & Control-Framework created for collaboration in python3☆318Updated 2 years ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆85Updated 2 years ago
- Graphical map of known Advanced Persistent Threats☆60Updated 8 months ago
- Nuclei templates for honeypots detection.☆196Updated 2 years ago
- An Interface for AI built for cybersecurity professionals☆93Updated 9 months ago
- Repository and archive for Killing The Bear Gitbook☆84Updated 2 years ago
- A ransomware group monitoring bot written in C#.☆57Updated 3 years ago
- List of Command&Control (C2) software☆46Updated 3 years ago
- Find Email Spoofing Vulnerablity of domains☆97Updated last year
- Some Pentesters, Security Researchers, Red Teamers which i learned from them a lot...☆112Updated last year