Johnng007 / Black-WidowView external linksLinks
A collection of Script for Red Team & Incidence Response
☆11Jun 30, 2022Updated 3 years ago
Alternatives and similar repositories for Black-Widow
Users that are interested in Black-Widow are comparing it to the libraries listed below
Sorting:
- Cmdlets for capturing Windows Events☆14Mar 11, 2022Updated 3 years ago
- ☆20May 30, 2025Updated 8 months ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Aug 4, 2021Updated 4 years ago
- Some Cheat Sheet for Red Team☆18Dec 30, 2022Updated 3 years ago
- Another vulnerability scanner☆18Aug 9, 2025Updated 6 months ago
- My personal collection of webshells for educational purposes. Most are custom implementations/adaptations of stuff I found on the interne…☆21May 20, 2024Updated last year
- ESXi Cyber Security Incident Response Script☆25Sep 4, 2024Updated last year
- Massayo is a small proof-of-concept Rust library which removes AV/EDR hooks in a given system DLL☆64Sep 12, 2022Updated 3 years ago
- ☆30Apr 24, 2019Updated 6 years ago
- Cute "Pure Shell" Script-Running CLI☆42Oct 27, 2025Updated 3 months ago
- Net Zapper is a vulnerability assessment and password cracking tool written in python☆10Feb 3, 2017Updated 9 years ago
- MISP to Microsoft Defender integration☆16Feb 6, 2026Updated last week
- An OSINT tool for IT ninjas.☆11Jul 31, 2024Updated last year
- A simple DNS exfiltration script☆11Apr 17, 2023Updated 2 years ago
- ☆10Oct 22, 2017Updated 8 years ago
- a tool for extracting, searching, and saving JavaScript files (with optional headless browser)☆38Sep 15, 2022Updated 3 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Sep 17, 2019Updated 6 years ago
- This iOS 9 app lets you use your own filter list in Safari.☆11Sep 5, 2015Updated 10 years ago
- ☆14May 20, 2019Updated 6 years ago
- A PoC for CVE-2022-2588 that triggers a WARNING☆10Sep 28, 2022Updated 3 years ago
- Chrome extension for blocking x-origin cookies☆12Jul 5, 2016Updated 9 years ago
- ☆14Feb 8, 2020Updated 6 years ago
- Disk Image Mounting Script☆11Jan 22, 2026Updated 3 weeks ago
- A lightweight Python module to interact with the MITRE ATT&CK® Enterprise dataset. Built for speed with minimal dependencies. Read the do…☆11Nov 24, 2025Updated 2 months ago
- Place to store .md notes and host other things related to work I do☆15Jun 20, 2023Updated 2 years ago
- Server for receiving autorun data from the clients☆13Sep 26, 2017Updated 8 years ago
- Instructions for hacking and cloning RFID cards☆18Nov 28, 2023Updated 2 years ago
- EasyCTF Writeups☆13Jan 10, 2015Updated 11 years ago
- A collection of handy and specific tools for the Red Teamer☆11Aug 13, 2024Updated last year
- ☆13Aug 11, 2018Updated 7 years ago
- Threat Intel and Incident Reponse☆10Aug 29, 2018Updated 7 years ago
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Mar 11, 2025Updated 11 months ago
- socat version 2☆10Aug 30, 2012Updated 13 years ago
- ☆12Jun 22, 2022Updated 3 years ago
- This tool aims at parsing Microsoft Protection logs to provide relevant data to forensic analysts during incident responses.☆21Sep 30, 2022Updated 3 years ago
- ☆11Aug 7, 2021Updated 4 years ago
- Blogs, Tools and other available resources for source code review.☆10Nov 18, 2021Updated 4 years ago
- TCP Data Transfer Tool By ClumsyLulz☆12Feb 25, 2023Updated 2 years ago