IceCubeSandwich / chronixView external linksLinks
A self-hosted, real-time collaborative workspace for offensive security assessments.
☆36Jan 27, 2026Updated 2 weeks ago
Alternatives and similar repositories for chronix
Users that are interested in chronix are comparing it to the libraries listed below
Sorting:
- takes shellcode bad-bytes and banishes them, returning cleaned shellcode with preserved functionalities☆57Updated this week
- Cuckoo sandbox ansible role☆16Apr 30, 2023Updated 2 years ago
- Elastic Security Labs' malware analysis and reverse engineering library☆51Feb 6, 2026Updated last week
- A Kubernetes Forensic Collection Framework for Azure Kubernetes Service☆40Aug 15, 2025Updated 5 months ago
- Phantom Keylogger is an advanced, stealth-enabled keystroke and visual intelligence gathering system.☆74Dec 10, 2025Updated 2 months ago
- PowerShell SharePoint extraction + auditing tool for red/blue/purple teams. Enumerates all SharePoint sites/drives a user can access via …☆98Jan 25, 2026Updated 2 weeks ago
- Unbranded content for Mercy Corps' Data Protection & Privacy Guides. For more info see https://www.mercycorps.org/research-resources/data…☆10Sep 1, 2022Updated 3 years ago
- KitsuneC2 is a cross-platform adversary emulation tool written in Go.☆12Oct 25, 2024Updated last year
- Automatic multiprocess Linux CLI tool that aims for a quick enumeration wrapping pentesting tools.☆13Feb 1, 2026Updated last week
- Documentation, U-Boot and OpenWRT ports for a low-cost MT02 repeater.☆14Oct 27, 2025Updated 3 months ago
- This program aims to check active targets by saving screenshots in a project.☆14Jan 9, 2026Updated last month
- Efficiently manage and track your job application history☆13May 1, 2025Updated 9 months ago
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.☆45Apr 21, 2025Updated 9 months ago
- NoDelete is a tool that assists in malware analysis by locking a folder where malware drops files before deleting them.☆49Nov 17, 2025Updated 2 months ago
- Forensic tool for extracting and analyzing Google DriveFS cached files and metadata.☆19May 9, 2025Updated 9 months ago
- !3 is a simple, secure and open source paste sharing platform.☆13Feb 5, 2026Updated last week
- ☆16Dec 7, 2025Updated 2 months ago
- Detect public repository dependencies in the GitHub repositories with an orphan required library.☆22Jun 24, 2025Updated 7 months ago
- Baseline organizational policies and practices☆10Apr 17, 2017Updated 8 years ago
- ☆10Aug 9, 2024Updated last year
- ☆21Sep 4, 2025Updated 5 months ago
- Windows Shell Link (LNK) Proof of Concept☆16Jul 19, 2025Updated 6 months ago
- Minimalistic port-spoofer written in Python☆11Jan 9, 2025Updated last year
- Add tracking hidden image to Word documents☆16Aug 30, 2017Updated 8 years ago
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Jun 26, 2025Updated 7 months ago
- A basic NodeJS/ExpressJS app that uses 2FA with both Google TOTP and Fido U2F☆10Dec 4, 2020Updated 5 years ago
- Repository of wordlists and dictionaries for fuzzing and bruteforcing☆10Aug 17, 2020Updated 5 years ago
- Sysmon Tools for PowerShell☆12Aug 17, 2018Updated 7 years ago
- A cross-platform, collaborative C2 for red-teaming. Agents are cross-compilable (e.g, you can generate Windows DLLs on Linux), cross-comp…☆24Mar 7, 2025Updated 11 months ago
- PCB design for the initial prototype of OBC hardware, to interface with LaunchPad.☆10Sep 19, 2018Updated 7 years ago
- Remove NotebookLM watermarks from slides. Local processing, no upload needed.☆31Jan 15, 2026Updated 3 weeks ago
- smugglo - an easy to use script for wrapping files into self-dropping HTML payloads to bypass content filters☆131Mar 25, 2025Updated 10 months ago
- ☆16Aug 20, 2017Updated 8 years ago
- Zone transfer a domain from its own NS servers and bruteforce subdomains☆12Mar 8, 2025Updated 11 months ago
- ☆17Jan 9, 2025Updated last year
- A (purpousely) vulnerable, social-media-like, django web application☆12Jun 10, 2021Updated 4 years ago
- Phone Radar is a simple tool that allows you to scan mobile phone numbers and display the provider tied to the number, can be usefull to …☆14Dec 13, 2024Updated last year
- Minimal ELF inspector written in C for quick binary layout inspection☆29Jan 9, 2026Updated last month
- Collection of red team scripts, resources & configs.☆15May 9, 2025Updated 9 months ago