H4NM / WhoYouCalling
Records an executable's network activity into a Full Packet Capture file (.pcap) and much more.
☆211Updated last week
Related projects ⓘ
Alternatives and complementary repositories for WhoYouCalling
- A tool collection for filtering and visualizing logon events. Designed to help answering the "Cotton Eye Joe" question (Where did you com…☆161Updated this week
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆139Updated last month
- God Mode Detection Rules☆130Updated 3 months ago
- PowerShell script helping Incident Responders discover potential adversary persistence mechanisms.☆308Updated 3 weeks ago
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆306Updated 7 months ago
- Wireshark RDP resources☆203Updated 5 months ago
- An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.☆165Updated 4 months ago
- Retired TrustedSec Capabilities☆225Updated last month
- An ADCS honeypot to catch attackers in your internal network.☆222Updated 4 months ago
- Canary Detection☆160Updated 7 months ago
- MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection.☆218Updated 3 months ago
- Respotter is a Responder honeypot! Catch attackers as soon as they spin up Responder in your environment.☆166Updated 2 months ago
- The purpose of this project is to publish and maintain the deployment PowerShell script that automates deployments for Active Directory C…☆231Updated 11 months ago
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆105Updated last month
- Tools for interacting with authentication packages using their individual message protocols☆296Updated last week
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆171Updated 9 months ago
- Free training course offered at Hack Space Con 2023☆132Updated last year
- A curated list of awesome LOLBins, GTFO projects, and similar 'Living Off the Land' security resources.☆111Updated 2 weeks ago
- ScriptSentry finds misconfigured and dangerous logon scripts.☆332Updated this week
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆192Updated last month
- ☆180Updated last month
- ☆114Updated 7 months ago
- MAAD Attack Framework - An attack tool for simple, fast & effective security testing of M365 & Entra ID (Azure AD).☆358Updated last month
- Analyze pcaps with Zeek and a Grafana Dashboard☆161Updated 5 months ago
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆342Updated 7 months ago
- Python tool to check rootkits in Windows kernel☆165Updated 3 months ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆110Updated 7 months ago
- ☆181Updated 9 months ago
- User Enumeration of Microsoft Teams users via API☆117Updated 7 months ago
- PowerShell script designed to help Incident Responders collect forensic evidence from local and remote Windows devices.☆91Updated 2 months ago