Knowledge base on cybercriminal concealment techniques
☆234Mar 18, 2026Updated last month
Alternatives and similar repositories for CLOAK
Users that are interested in CLOAK are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- the repo for cmtracker☆22Oct 8, 2018Updated 7 years ago
- Python implementation of the CaRT library for (un)inerting files.☆53Feb 10, 2025Updated last year
- High fidelity JA3 & JA3S combinations for known botnets and alike☆12Feb 14, 2019Updated 7 years ago
- Menu for Thor scanner lite☆20Oct 24, 2025Updated 6 months ago
- Scripts to for ready-to-use Velociraptor instance deployment in Azure☆14Jun 27, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Show PIM role to solve a task - and group to activate the needed permission☆15May 22, 2025Updated 11 months ago
- Very Vulnerable Management API (VVMA) is a deliberately insecure RESTful API built with Node.js for educational and testing purposes. It …☆70Jun 5, 2025Updated 11 months ago
- Automated Reverse TCP tunneling using a digitalocean instance and aploium's shootback repo (https://github.com/aploium/shootback)☆13Oct 30, 2018Updated 7 years ago
- lolC2 is a collection of C2 frameworks that leverage legitimate services to evade detection☆324Apr 22, 2026Updated 2 weeks ago
- Extract Procedural Details of the TTP based on the actor mentioned in OSINT reportings☆13Feb 25, 2024Updated 2 years ago
- Comprehensive AWS cloud reconnaissance and privilege escalation toolkit written in Python. Features IAM, EC2, S3, Lambda, ECS, Secrets Ma…☆50Jul 8, 2025Updated 10 months ago
- irCRpull is a PowerShell script utilized to pull several system artifacts, utilizing the free tool CrowdResponse, from a live Win7+ syste…☆14Mar 25, 2015Updated 11 years ago
- Share threat intelligence and detect tools about APT "NightEgle" (APT-Q-95)☆40Jul 4, 2025Updated 10 months ago
- Research into Undocumented Behavior of Azure AD Refresh Tokens☆13Oct 27, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆43Apr 23, 2024Updated 2 years ago
- A high-performance TUI-based packet crafting tool written in Rust.☆36Dec 25, 2025Updated 4 months ago
- local trading of BNB and Meme Rush tokens on Binance Smart Chain☆28Apr 16, 2026Updated 3 weeks ago
- ☆22Jan 31, 2023Updated 3 years ago
- OSINT Bookmarks for Firefox / Chrome / Edge / Safari☆66May 24, 2020Updated 5 years ago
- Velociraptor Server hosted in Azure App Service☆58Jun 4, 2025Updated 11 months ago
- DeepSeek Pentest AI - Burp Suite extension☆59Sep 14, 2025Updated 7 months ago
- Python WiFi is a Python 3 module that provides read and write access to a wireless network card's capabilities using the Linux Wireless E…☆12Aug 26, 2016Updated 9 years ago
- ☆21Jan 28, 2026Updated 3 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Simple hunting script for suspicious M365 OAuth Apps☆323Sep 23, 2025Updated 7 months ago
- ☆63Mar 15, 2026Updated last month
- Repo to hold mcp server for velociraptor☆37Apr 15, 2026Updated 3 weeks ago
- AI-Powered Threat Intelligence MCP tool☆37Jul 18, 2025Updated 9 months ago
- Security Blogs - A simple aggregator for security news/blog☆26Apr 29, 2026Updated last week
- When Your Vision Reaches Beyond IAM Boundary Scope in AWS Cloud☆46Dec 7, 2025Updated 5 months ago
- This repo contains a series of challenges that get harder and harder to exploit☆16Jun 16, 2025Updated 10 months ago
- A cybersecurity dataset consisting of 4.3 million entries of Twitter, Blogs, Paper, and CVEs☆20May 26, 2023Updated 2 years ago
- ☆22Apr 14, 2026Updated 3 weeks ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Anti-Honeypot Demo (obsolete)☆18Jul 24, 2017Updated 8 years ago
- A cleaned up Go version of TxtElite☆10Nov 14, 2022Updated 3 years ago
- Active Directory share enumeration tool☆12Apr 28, 2025Updated last year
- Python framework for collecting and analyzing TLS certificate data via the Certificate Transparency Network☆12May 25, 2025Updated 11 months ago
- A meta-list of public references to threat actor profiles and APT group datasets.☆80Oct 2, 2025Updated 7 months ago
- ☆102Apr 4, 2025Updated last year
- This tool is designed to seamlessly convert Postman collections into OpenAPI schemas. This conversion is essential for API security testi…☆12Sep 3, 2024Updated last year