MalwareHunters / vultriever
☆58Updated last year
Alternatives and similar repositories for vultriever:
Users that are interested in vultriever are comparing it to the libraries listed below
- Analyzing AD domains for security risks related to user accounts☆63Updated 2 years ago
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strike☆52Updated 2 years ago
- C2 Automation using Linode☆80Updated 2 years ago
- Powershell script to help Speed up Threat hunting incident response processes☆45Updated last year
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- ☆94Updated last year
- It was developed to speed up the processes of SOC Analysts during analysis☆48Updated last year
- pyCobaltHound is an Aggressor script extension for Cobalt Strike which aims to provide a deep integration between Cobalt Strike and Blood…☆137Updated last year
- WEB-Wordlist-Generator creates related wordlists after scanning your web applications.☆49Updated 10 months ago
- 1C RAS Offensive Security Tool☆25Updated last year
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆65Updated 2 years ago
- Bruteforces Fortinet SSL VPNs☆56Updated last year
- Fast Path Traversal exploitation tool☆21Updated 11 months ago
- POC for hikivison devices based on the following vulnerability https://www.exploit-db.com/exploits/44328☆57Updated last year
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆39Updated last year
- ☆106Updated 4 months ago
- Repo for all my exploits/PoCs☆50Updated last month
- Easy red team phishing with Puppeteer☆128Updated 2 years ago
- A comprehensive Python-based security tool for file scanning, malware detection, and analysis in an ever-evolving cyber landscape.☆98Updated last year
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆98Updated last year
- A collection of red blue team staff☆46Updated last year
- Enhance your malware detection with WAF + YARA (WAFARAY)☆108Updated 2 years ago
- Search for c2 servers based on netlas☆39Updated last year
- 🚀 CSRFShark - a utility for manipulating cross-site request forgery attacks☆32Updated last year
- Cobalt Strike profile generator using Jenkins to automate the heavy lifting☆34Updated 2 years ago
- Personal notes from Red teamer for Blue/Red/Purple.☆53Updated last year
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆40Updated 2 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆62Updated 2 years ago
- Cloud Exploit Framework☆113Updated 2 years ago
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Updated 2 years ago