Neo23x0 / tiny-shells
All kinds of tiny shells
☆58Updated 2 years ago
Alternatives and similar repositories for tiny-shells:
Users that are interested in tiny-shells are comparing it to the libraries listed below
- Yara Rules for Modern Malware☆73Updated last year
- C2 Automation using Linode☆80Updated 2 years ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆81Updated 10 months ago
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆32Updated 3 months ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆87Updated last year
- Create a cool process tree like https://twitter.com/ACEResponder.☆35Updated 2 years ago
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆76Updated 6 months ago
- Ludus is a system to build easy to use cyber environments, or "ranges" for testing and development.☆33Updated last year
- DEFCON 31 slide deck and video link☆58Updated 8 months ago
- A small utility to translate NTDS.dit files to SQLite format.☆71Updated last year
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆101Updated last year
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆51Updated last year
- Red Team "Drop and Run" NAC (802.1x) Bypass☆70Updated last year
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆51Updated 3 months ago
- Bash Script to extract GNU/Linux forensic artifacts for digital forensic analysis and incident response.☆43Updated last year
- Simple PowerShell script to enable process scanning with Yara.☆91Updated 2 years ago
- create a "simulated internet" cyber range environment☆15Updated last month
- ☆80Updated 3 months ago
- Advanced Email Threat Hunting w/ Detection as Code☆51Updated last month
- ☆34Updated last year
- MS Graph Commands and Tools for Blue Teamers☆49Updated last year
- InfoSec Notes☆56Updated 11 months ago
- ☆24Updated 2 years ago
- SMBMap is a handy SMB enumeration tool - here with Kerberos support☆73Updated 3 years ago
- Artifact monitoring that ensures fairplay☆75Updated last month
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆34Updated last year
- PowerShell scripts to create sandboxed or vulnerable environments using HyperV and AutomatedLab☆76Updated last month
- Default Detections for EDR☆96Updated last year