JacobPimental / gunslinger
Gunslinger is used to hunt for Magecart sites using URLScan's API
☆30Updated 2 years ago
Alternatives and similar repositories for gunslinger:
Users that are interested in gunslinger are comparing it to the libraries listed below
- ☆34Updated last month
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 3 years ago
- ☆14Updated 4 years ago
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆29Updated 6 years ago
- The Purpose of this research tool is to provide a Python client into RiskIQ API services.☆22Updated 4 years ago
- Collaborative web dashboard for RedTeam pentesters☆21Updated 5 years ago
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Updated 4 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Updated last year
- The Fastest way to consume Threat Intel☆25Updated 2 years ago
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆24Updated 10 years ago
- Various Python scripts that have come in handy but aren't important enough to get their own repository☆22Updated 4 years ago
- Slack/Microsoft Teams notification for new Empire/Meterpreter checkins☆24Updated 3 months ago
- LetMeOutOfYour.net Resources☆20Updated 4 years ago
- ☆34Updated 4 years ago
- PowerShell Memory Pulling script☆19Updated 9 years ago
- Exfiltration based on custom X509 certificates☆26Updated last year
- A collection of scripts for the purpose of gathering open source intelligence, to be presented at GrayHat, BSides Denver, and Information…☆25Updated 4 years ago
- random buffer overflows as I get ready to take the oscp in 2097☆12Updated 7 years ago
- Veil 3.1.X (Check version info in Veil at runtime)☆14Updated 5 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆36Updated 5 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 5 years ago
- Web Filter External Enumeration Tool (WebFEET)☆75Updated 10 years ago
- Presentation materials for talks I've given.☆20Updated 5 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Updated 7 years ago
- Active Directory information dumper via LDAP☆12Updated 5 years ago
- ☆22Updated 4 years ago
- Nmap NSE script to detect Pulse Secure SSL VPN file disclosure CVE-2019-11510☆18Updated 5 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆25Updated 5 years ago