NexusFuzzy / raccoon_configLinks
Scans a list of raccoon servers from Tria.ge and extracts the config
☆15Updated last year
Alternatives and similar repositories for raccoon_config
Users that are interested in raccoon_config are comparing it to the libraries listed below
Sorting:
- ☆14Updated last year
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated 2 years ago
- ☆14Updated 2 years ago
- EventLogSilencer is a PowerShell script designed for disable Windows Event Logging☆17Updated last year
- Collection of generic YARA rules☆16Updated 11 months ago
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆21Updated 10 months ago
- CIS Benchmark testing of Windows SIEM configuration☆44Updated 2 years ago
- This is a repo for fetching Applocker event log by parsing the win-event log☆31Updated 2 years ago
- Python tool to find vulnerable AD object and generating csv report☆26Updated 2 years ago
- A proof-of-concept re-assembler for reverse VNC traffic.☆25Updated 2 years ago
- ☆24Updated 2 years ago
- PDump is a project for dumping leaked credentials from DEHASHED☆16Updated last year
- The repository accompanying the Buer Emulation workshop☆24Updated 3 years ago
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆20Updated last month
- Random scripts for azure stuff☆11Updated 2 years ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated 2 years ago
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Updated 4 years ago
- ☆27Updated 2 years ago
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆49Updated 3 years ago
- ☆12Updated 2 years ago
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆21Updated 3 years ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Updated 2 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆35Updated 2 years ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated last year
- Active DIrectory Lab for Pentesting Practice☆24Updated 2 years ago
- Repository for LNK stuff☆30Updated 2 years ago
- WMI SA stuffs☆30Updated 3 years ago
- Searching .evtx logs for remote connections☆23Updated last year
- ☆12Updated 4 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Updated 2 years ago