Knowledge base on cybercriminal concealment techniques
☆231Mar 18, 2026Updated 3 weeks ago
Alternatives and similar repositories for CLOAK
Users that are interested in CLOAK are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Python implementation of the CaRT library for (un)inerting files.☆52Feb 10, 2025Updated last year
- the repo for cmtracker☆22Oct 8, 2018Updated 7 years ago
- Free Email Providers☆11Aug 15, 2023Updated 2 years ago
- High fidelity JA3 & JA3S combinations for known botnets and alike☆12Feb 14, 2019Updated 7 years ago
- Menu for Thor scanner lite☆20Oct 24, 2025Updated 5 months ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Scripts to for ready-to-use Velociraptor instance deployment in Azure☆14Jun 27, 2023Updated 2 years ago
- Show PIM role to solve a task - and group to activate the needed permission☆15May 22, 2025Updated 10 months ago
- config files for i3wm☆16Nov 11, 2017Updated 8 years ago
- Social Engineering Tactics contains real-world social engineering tactics used for manipulation, persuasion, and deception. Stay aware an…☆46Jan 25, 2026Updated 2 months ago
- Very Vulnerable Management API (VVMA) is a deliberately insecure RESTful API built with Node.js for educational and testing purposes. It …☆70Jun 5, 2025Updated 10 months ago
- Automated Reverse TCP tunneling using a digitalocean instance and aploium's shootback repo (https://github.com/aploium/shootback)☆13Oct 30, 2018Updated 7 years ago
- Simple web app for displaying cowrie data in your browser☆12Jun 2, 2016Updated 9 years ago
- Comprehensive AWS cloud reconnaissance and privilege escalation toolkit written in Python. Features IAM, EC2, S3, Lambda, ECS, Secrets Ma…☆50Jul 8, 2025Updated 9 months ago
- A high-performance TUI-based packet crafting tool written in Rust.☆34Dec 25, 2025Updated 3 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆11Aug 17, 2025Updated 7 months ago
- Share threat intelligence and detect tools about APT "NightEgle" (APT-Q-95)☆41Jul 4, 2025Updated 9 months ago
- Research into Undocumented Behavior of Azure AD Refresh Tokens☆13Oct 27, 2023Updated 2 years ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆43Apr 23, 2024Updated last year
- MalBox is a quick and dirty setup to create a malware analysis VM☆14Aug 27, 2024Updated last year
- A STIX 2.1 Extension Definition for the Course of Action (COA) object type. The nested property extension allows a COA to share machine-r…☆23Dec 11, 2023Updated 2 years ago
- local trading of BNB and Meme Rush tokens on Binance Smart Chain☆28Mar 17, 2026Updated 3 weeks ago
- Universal Forensic Indexer and Analyzer☆10Jan 8, 2017Updated 9 years ago
- Lena's scripts/code/resources for malware analysis☆26Jun 13, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- OSINT Bookmarks for Firefox / Chrome / Edge / Safari☆66May 24, 2020Updated 5 years ago
- ☆22Jan 31, 2023Updated 3 years ago
- Velociraptor Server hosted in Azure App Service☆59Jun 4, 2025Updated 10 months ago
- Repo to hold mcp server for velociraptor☆35Jul 27, 2025Updated 8 months ago
- Python WiFi is a Python 3 module that provides read and write access to a wireless network card's capabilities using the Linux Wireless E…☆12Aug 26, 2016Updated 9 years ago
- ☆21Jan 28, 2026Updated 2 months ago
- Maltego Transforms for generating screenshots from Websites and URLs☆16Apr 24, 2023Updated 2 years ago
- ☆62Mar 15, 2026Updated 3 weeks ago
- Simple hunting script for suspicious M365 OAuth Apps☆323Sep 23, 2025Updated 6 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Flexible framework that allows automation to process cyber threat information and update endpoint defense tools.☆20Oct 24, 2018Updated 7 years ago
- When Your Vision Reaches Beyond IAM Boundary Scope in AWS Cloud☆45Dec 7, 2025Updated 4 months ago
- A web API for various cyber threat intelligence frameworks, including MITRE ATT&CK, CWE, ATLAS...☆19Mar 26, 2026Updated last week
- A cybersecurity dataset consisting of 4.3 million entries of Twitter, Blogs, Paper, and CVEs☆20May 26, 2023Updated 2 years ago
- A cleaned up Go version of TxtElite☆10Nov 14, 2022Updated 3 years ago
- Active Directory share enumeration tool☆12Apr 28, 2025Updated 11 months ago
- An Adaptive Misuse Detection System☆47Nov 4, 2024Updated last year