MalwareTech / Log4jTools
Tools for investigating Log4j CVE-2021-44228
☆94Updated 2 years ago
Related projects: ⓘ
- Red Team C2 Infrastructure built in AWS using Ansible!☆219Updated 3 years ago
- A repo to support the book☆103Updated 3 years ago
- ☆68Updated last year
- HoneyCreds network credential injection to detect responder and other network poisoners.☆211Updated 2 years ago
- SpecterOps Presentations☆176Updated last month
- ☆68Updated 2 years ago
- ☆167Updated this week
- A quick handy script to harvest credentials off of a user during a Red Team and get execution of a file from the user☆249Updated 2 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆143Updated 11 months ago
- User enumeration with Microsoft Teams API☆164Updated 3 years ago
- [S]imple [T]actical [A]gent [R]elay: A peer-to-peer C2-ish framework for Ethical Hackers and Security Researchers.☆31Updated 2 years ago
- ☆94Updated 3 years ago
- Lookup for interesting stuff in SMB shares☆147Updated last year
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆57Updated last year
- A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object☆162Updated last year
- Mindmaps allow to organize and understand information faster and better.☆2Updated 2 years ago
- Tool for assessing on-premises Microsoft servers authentication such as ADFS, Skype, Exchange, and RDWeb☆139Updated 3 years ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆131Updated 2 years ago
- This repository contains procedures found in the Feb 2022 conti leaks. They were taken from the "manual_teams_c" rocketchat channel in th…☆87Updated 2 years ago
- Project for identifying executables that have command-line options that can be obfuscated, possibly bypassing detection rules.☆136Updated 3 years ago
- ☆195Updated last year
- ☆200Updated 2 years ago
- Zuthaka is an open source application designed to assist red-teaming efforts, by simplifying the task of managing different APTs and othe…☆174Updated last year
- Ansible playbook to deploy a phishing engagement in the cloud.☆216Updated 2 years ago
- ☆76Updated 4 years ago
- Automated, extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets.☆250Updated 3 years ago
- ☆94Updated this week
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆72Updated 2 years ago
- easy-to-use payload hosting☆260Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆215Updated 2 years ago