LOLBAS-Project / LOLBAS-Project.github.ioLinks
☆90Updated 2 months ago
Alternatives and similar repositories for LOLBAS-Project.github.io
Users that are interested in LOLBAS-Project.github.io are comparing it to the libraries listed below
Sorting:
- A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object☆168Updated 3 years ago
- ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabili…☆178Updated 2 weeks ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆105Updated 3 years ago
- Active C2 IoCs☆99Updated 3 years ago
- Veil-PowerView is a powershell tool to gain network situational awareness on Windows domains.☆63Updated 10 years ago
- My conference presentations☆87Updated 2 months ago
- See adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)☆107Updated 2 years ago
- Picus Labs☆44Updated 4 years ago
- LLMNR/NBNS/mDNS Spoofing Detection Toolkit☆60Updated 3 years ago
- ☆101Updated last year
- ☆28Updated 4 years ago
- Fraktal's Ransomware Emulator☆101Updated last year
- Presentation material presented by Outflank team members at public events.☆192Updated 4 months ago
- Detect webshells dropped on Microsoft Exchange servers exploited through "proxylogon" group of vulnerabilites (CVE-2021-26855, CVE-2021-2…☆99Updated 4 years ago
- Valhalla API Client☆70Updated 2 weeks ago
- ☆69Updated 4 years ago
- Linux Evidence Acquisition Framework☆119Updated last year
- Simple PowerShell script to enable process scanning with Yara.☆98Updated 3 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆74Updated 4 years ago
- attack2jira automates the process of standing up a Jira environment that can be used to track and measure ATT&CK coverage☆115Updated 2 years ago
- Run several volatility plugins at the same time☆117Updated 3 years ago
- Mindmaps for threat hunting - work in progress.☆152Updated 3 years ago
- Linux Incident Response☆90Updated 6 years ago
- evtx-hunter helps to quickly spot interesting security-related activity in Windows Event Viewer (EVTX) files.☆158Updated 4 years ago
- A list of JARM hashes for different ssl implementations used by some C2/red team tools.☆145Updated 2 years ago
- Basic C2 Server☆193Updated 4 years ago
- Active Directory Purple Team Playbook☆115Updated 2 years ago
- Collection of created MindMaps☆151Updated 2 years ago
- ☆98Updated 4 months ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆116Updated 4 years ago