LetsDefendio / Simple-Live-Data-Collection
Simple Live Data Collection Tool
☆21Updated 4 years ago
Alternatives and similar repositories for Simple-Live-Data-Collection:
Users that are interested in Simple-Live-Data-Collection are comparing it to the libraries listed below
- LetMeOutOfYour.net Resources☆20Updated 4 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- Sp00fer blog post -☆26Updated 2 years ago
- Simple C2 over the Trello API☆38Updated 2 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- ☆22Updated 4 years ago
- Manticore's Public Threats Repository☆10Updated 4 years ago
- Domain Enrichment Toolkit $ pip install richkit☆11Updated last year
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 3 years ago
- A PowerShell script to prevent Sysmon from writing its events☆15Updated 4 years ago
- A tool that automates the trevorc2 powershell agent obfuscation process with the pyfuscation tool☆15Updated last year
- Nmap NSE script to detect Pulse Secure SSL VPN file disclosure CVE-2019-11510☆18Updated 5 years ago
- ☆16Updated 5 years ago
- A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo…☆19Updated 2 years ago
- Scripts for OSCE☆18Updated 6 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆30Updated 3 years ago
- This script runs multithreading module that connects to a remote TCP server, monitors active (opened) Microsoft Word documents (.doc,.doc…☆33Updated 4 years ago
- ☆34Updated 2 months ago
- ☆20Updated 4 years ago
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Updated last year
- Finding sensitive information in the trimmed parts of cropped images☆29Updated 3 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆37Updated 5 years ago
- Speaking materials from conferences I've given☆9Updated 2 years ago
- s3eker is an extensible way to find open S3 buckets.☆17Updated 4 years ago
- just manipulatin these here tokens yes sir nothing weird☆22Updated 2 years ago
- Searching .evtx logs for remote connections☆23Updated last year
- Forked and updated with some additional features over the original☆16Updated 3 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆36Updated 5 years ago