MinervaLabsResearch / BlogPosts
Code examples from recent blog posts by minerva labs.
☆45Updated 6 years ago
Alternatives and similar repositories for BlogPosts:
Users that are interested in BlogPosts are comparing it to the libraries listed below
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- A multi-purpose meterpreter executable (inline, many transports, msfpayload)☆79Updated 7 years ago
- Automated enumeration☆30Updated 4 years ago
- Open Source - Common Findings DataBase (JSON & MD)☆67Updated 2 years ago
- Premantel - A Malware analysis and Threat Intel Framework☆36Updated 6 years ago
- All the Power with no Shell☆36Updated 3 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆66Updated 6 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆57Updated 10 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Updated 6 years ago
- Sandbox feature upgrade with the help of wrapped samples☆76Updated 6 years ago
- Revrese DNS payload for Metasploit: Download Exec x86 shellcode. Also DNS Handler and VBS bot (alsow working over DNS) as PoC included.☆41Updated 8 years ago
- Scan web server for known webshell names and responses☆50Updated 8 years ago
- SMTP server / sinkhole for collecting spam☆44Updated 6 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Updated 7 years ago
- Exfiltration Framework - Exfiltration modeling tool written in Python. Naisho attempts to avoid detection from DLP, IPS/IDS egress filter…☆38Updated 10 years ago
- ☆59Updated 5 years ago
- Make Windows LNK file with python (pylnk)☆66Updated 8 years ago
- Empire HTTP(S) C2 redirector setup script☆47Updated 6 years ago
- PowerShell Empire module for logging USB keystrokes via ETW☆31Updated 8 years ago
- post-exploitation tools☆15Updated 7 years ago
- A tool to help you manage your leaks☆34Updated 7 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- C# code for Transferring Backdoor Payloads by DNS Traffic (A - PTR Records) and Bypassing Anti-viruses☆45Updated last year
- WORK IN PROGRESS. Waits for MSF session then automatically gets domain admin☆63Updated 2 years ago
- Snippets I used on exploit development, mostly broken.☆11Updated 7 years ago
- Some simple and useful tools☆15Updated 6 years ago
- Masscan integrated with Shodan API☆41Updated 7 years ago
- A chef cookbook which can be used to quickly deploy a high interaction honeypot, using the sysdig and falco tools☆41Updated 8 years ago
- Environmental (and http) keying for scripting languages☆39Updated 6 years ago
- A tool for fuzzing for ports that allow outgoing connections☆18Updated 6 years ago