H4NM / WhoYouCalling
Records an executable's network activity into a Full Packet Capture file (.pcap) and much more.
☆214Updated last week
Related projects ⓘ
Alternatives and complementary repositories for WhoYouCalling
- A tool collection for filtering and visualizing logon events. Designed to help answering the "Cotton Eye Joe" question (Where did you com…☆162Updated last week
- God Mode Detection Rules☆131Updated 3 months ago
- The purpose of this project is to publish and maintain the deployment PowerShell script that automates deployments for Active Directory C…☆232Updated 11 months ago
- PowerShell script helping Incident Responders discover potential adversary persistence mechanisms.☆308Updated last month
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆180Updated 2 months ago
- An ADCS honeypot to catch attackers in your internal network.☆226Updated 4 months ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆141Updated 2 months ago
- ScriptSentry finds misconfigured and dangerous logon scripts.☆337Updated last week
- PowerShell script designed to help Incident Responders collect forensic evidence from local and remote Windows devices.☆91Updated 2 months ago
- Analyze pcaps with Zeek and a Grafana Dashboard☆161Updated 5 months ago
- ☆180Updated 2 months ago
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆105Updated last month
- MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection.☆221Updated 3 months ago
- Retired TrustedSec Capabilities☆227Updated last month
- Wireshark RDP resources☆203Updated 6 months ago
- ☆493Updated 7 months ago
- ☆114Updated 7 months ago
- Canary Detection☆162Updated 7 months ago
- Azure DevOps Services Attack Toolkit☆260Updated 3 months ago
- WifiForge is a tool developed by Black Hills InfoSec to help train Pentesters on different Wi-Fi attack vectors and Wireless capabilities…☆65Updated 4 months ago
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆309Updated 7 months ago
- Tools for interacting with authentication packages using their individual message protocols☆298Updated 3 weeks ago
- VirtualGHOST Detection Tool☆87Updated 6 months ago
- A companion tool that uses ADeleg to find insecure trustee and resource delegations in Active Directory☆151Updated 2 months ago
- An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.☆168Updated 4 months ago
- Nuke It From Orbit - remove AV/EDR with physical access☆201Updated 3 weeks ago
- Windows Malware Investigation Scripts & Docs☆75Updated 2 weeks ago
- Python3 terminal application that contains 405 Neo4j cyphers for BloodHound data sets and 388 GUI cyphers☆374Updated last month
- Some scripts to abuse kerberos using Powershell☆313Updated last year
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆343Updated 7 months ago