MinervaLabsResearch / BlogPostsLinks
Code examples from recent blog posts by minerva labs.
☆45Updated 6 years ago
Alternatives and similar repositories for BlogPosts
Users that are interested in BlogPosts are comparing it to the libraries listed below
Sorting:
- Premantel - A Malware analysis and Threat Intel Framework☆36Updated 6 years ago
- Collection of tools for web recon and enumeration.☆56Updated 9 years ago
- All the Power with no Shell☆36Updated 3 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- BlackHat Europe 2017 Slides☆26Updated 7 years ago
- A RAT (Remote Administration Tool) using port-knocking techniques for *NIX systems I wrote in 2006 but still works in 2017. libpcap-based…☆48Updated 8 years ago
- Some sample code from my Zero Nights 2017 presentation.☆61Updated 7 years ago
- SMTP server / sinkhole for collecting spam☆44Updated 6 years ago
- Scan web server for known webshell names and responses☆50Updated 8 years ago
- Mixing up CVE and MS like a pro☆25Updated 8 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Updated 6 years ago
- SilkETW & SilkService☆40Updated 5 years ago
- A tool to help you manage your leaks☆34Updated 7 years ago
- WORK IN PROGRESS. Waits for MSF session then automatically gets domain admin☆63Updated 2 years ago
- Environmental (and http) keying for scripting languages☆39Updated 6 years ago
- ☆59Updated 6 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆66Updated 6 years ago
- Sandbox feature upgrade with the help of wrapped samples☆76Updated 6 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 3 years ago
- PowerShell Empire module for logging USB keystrokes via ETW☆31Updated 8 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆57Updated 10 years ago
- NCC Group Ransomware Simulator☆69Updated 8 years ago
- A Generic Windows Memory Scraping Tool☆71Updated 8 years ago
- collection of useful shells for penetration tests☆37Updated 8 years ago
- ☆58Updated 7 years ago
- C# code for Transferring Backdoor Payloads by DNS Traffic (A - PTR Records) and Bypassing Anti-viruses☆45Updated last year
- Executables created while writing "Introduction to Manual Backdooring".☆79Updated 8 years ago
- Various config files obtained during malware analysis☆67Updated 6 years ago
- Exfiltration Framework - Exfiltration modeling tool written in Python. Naisho attempts to avoid detection from DLP, IPS/IDS egress filter…☆38Updated 10 years ago
- ☆50Updated 7 years ago