NexusFuzzy / raccoon_config
Scans a list of raccoon servers from Tria.ge and extracts the config
☆15Updated last year
Alternatives and similar repositories for raccoon_config:
Users that are interested in raccoon_config are comparing it to the libraries listed below
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated last year
- ☆14Updated 2 years ago
- ☆14Updated 10 months ago
- EventLogSilencer is a PowerShell script designed for disable Windows Event Logging☆16Updated last year
- Python tool to find vulnerable AD object and generating csv report☆26Updated 2 years ago
- aggregated repo for all conferences and talks I am giving☆17Updated 3 years ago
- ☆18Updated 11 months ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆18Updated last year
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆21Updated 8 months ago
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆20Updated 11 months ago
- Extension functionality for the NightHawk operator client☆27Updated last year
- ☆12Updated 4 years ago
- This is a repo for fetching Applocker event log by parsing the win-event log☆30Updated 2 years ago
- Collection of generic YARA rules☆15Updated 9 months ago
- CLI Search for Security Operators of MITRE ATT&CK URLs☆16Updated 2 years ago
- A simple to use single-include Windows API resolver☆20Updated 8 months ago
- CIS Benchmark testing of Windows SIEM configuration☆44Updated last year
- Serving files with conditions, serverside keying and more.☆17Updated 2 years ago
- Extract payload URLs from Follina (CVE-2022-30190) docx and rtf files☆31Updated 2 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆35Updated last year
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆47Updated 3 years ago
- ☆12Updated 2 years ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated 2 years ago
- PDump is a project for dumping leaked credentials from DEHASHED☆15Updated last year
- The repository accompanying the Buer Emulation workshop☆24Updated 3 years ago
- ☆34Updated 2 years ago
- Triaging Windows event logs based on SANS Poster☆39Updated 2 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- ☆24Updated 3 years ago
- Scripts to for ready-to-use Velociraptor instance deployment in Azure☆13Updated last year