MalwareHunters / vultriever
☆56Updated last year
Alternatives and similar repositories for vultriever:
Users that are interested in vultriever are comparing it to the libraries listed below
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strike☆52Updated 2 years ago
- VLAN ID Parser☆6Updated 9 months ago
- Analyzing AD domains for security risks related to user accounts☆63Updated 2 years ago
- C2 Automation using Linode☆80Updated 2 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- A go-exploit to scan for Juniper firewalls vulnerable to CVE-2023-36845☆61Updated last week
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆65Updated 2 years ago
- ☆94Updated last year
- Enhance your malware detection with WAF + YARA (WAFARAY)☆107Updated 2 years ago
- Bruteforces Fortinet SSL VPNs☆56Updated last year
- Powershell script to help Speed up Threat hunting incident response processes☆45Updated last year
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆97Updated last year
- PassMute - A multi featured Password Transmutation/Mutator Tool☆51Updated last year
- It was developed to speed up the processes of SOC Analysts during analysis☆47Updated 11 months ago
- WEB-Wordlist-Generator creates related wordlists after scanning your web applications.☆48Updated 8 months ago
- Easy red team phishing with Puppeteer☆127Updated 2 years ago
- Script for importing Nmap results into a Neo4j Graph Database☆20Updated 2 years ago
- A comprehensive Python-based security tool for file scanning, malware detection, and analysis in an ever-evolving cyber landscape.☆97Updated last year
- ☆42Updated 4 months ago
- Search for c2 servers based on netlas☆39Updated last year
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Updated 2 years ago
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.☆33Updated last year
- Updated version of PowerDNS by @domchell. Adds support for transfers over DNS A records and a few other useful features.☆82Updated last year
- Find Email Spoofing Vulnerablity of domains☆93Updated 6 months ago
- 1C RAS Offensive Security Tool☆24Updated last year
- Find Microsoft Exchange instance for a given domain and identify the exact version☆185Updated 2 years ago
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆29Updated last year
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆60Updated 6 months ago
- Personal notes from Red teamer for Blue/Red/Purple.☆53Updated last year
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆89Updated 7 months ago