Neo23x0 / tiny-shells
All kinds of tiny shells
☆58Updated 2 years ago
Alternatives and similar repositories for tiny-shells:
Users that are interested in tiny-shells are comparing it to the libraries listed below
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆51Updated 4 months ago
- DEFCON 31 slide deck and video link☆58Updated 9 months ago
- Reads and prints information from the website MalAPI.io☆38Updated 3 years ago
- Yara Rules for Modern Malware☆76Updated last year
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆81Updated 11 months ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆101Updated last year
- C2 Automation using Linode☆80Updated 2 years ago
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆33Updated 4 months ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated last year
- ☆80Updated 4 months ago
- https://lolad-project.github.io/☆73Updated 3 months ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆51Updated last year
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆78Updated 7 months ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆72Updated last year
- ☆24Updated 2 years ago
- A simple tool designed to create Atomic Red Team tests with ease.☆39Updated last month
- Create a cool process tree like https://twitter.com/ACEResponder.☆35Updated 2 years ago
- MS Graph Commands and Tools for Blue Teamers☆49Updated last year
- Bash Script to extract GNU/Linux forensic artifacts for digital forensic analysis and incident response.☆43Updated last year
- Detection rule validation☆41Updated last year
- Living Off Security Tools☆45Updated 5 months ago
- ☆33Updated last year
- A full analysis report detailing as much as possible of a Malware or a Threat☆28Updated 10 months ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆72Updated 3 years ago
- Artifact monitoring that ensures fairplay☆75Updated 2 months ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆124Updated 10 months ago
- ☆82Updated 2 years ago
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆91Updated 8 months ago
- tool for identifying guest relationships between companies☆85Updated 9 months ago
- Simple PowerShell script to enable process scanning with Yara.☆93Updated 2 years ago