General Content
☆27Dec 23, 2025Updated 3 months ago
Alternatives and similar repositories for Zombie
Users that are interested in Zombie are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Red Team Coin for crypto-mining operations.☆23Mar 1, 2026Updated 3 weeks ago
- ☆105Jul 5, 2025Updated 8 months ago
- Loading unmanaged dll (32 and 64bits) in managed exe☆11Dec 12, 2020Updated 5 years ago
- ☆12Jul 15, 2022Updated 3 years ago
- AppLocker hardening policies☆26Jul 26, 2018Updated 7 years ago
- Create a cool process tree like https://twitter.com/ACEResponder.☆35Mar 1, 2023Updated 3 years ago
- ☆17Mar 25, 2019Updated 6 years ago
- Zerologon Check and Exploit - Discovered by Tom Tervoort of Secura and expanded on @Dirkjanm's cve-2020-1472 coded example. This tool wil…☆18Apr 12, 2022Updated 3 years ago
- Splunk app to compare Endpoint Detection and Response solutions based on MITRE ATT&CK evaluations (APT3, APT29, Carbanak + FIN7, Wizard S…☆19Sep 5, 2022Updated 3 years ago
- A library to parse, modify, and implement Malleable C2 profiles☆27Feb 9, 2019Updated 7 years ago
- List of PowerShell commands and commandlets that should be in your Powershel watchlist☆39Jul 22, 2021Updated 4 years ago
- Linux Baseline and Forensic Triage Tool - BETA☆58Mar 10, 2026Updated 2 weeks ago
- improving zerosums smbdoor - a silent remote backdoor which abuses undoc. APIs in srvnet.sys☆49Mar 10, 2023Updated 3 years ago
- Community content for LogRhythm Axon. Includes Dashboards, searches, analytics rules, processing policies and more.☆10Jul 26, 2024Updated last year
- Adversarial Interception Mission Oriented Discovery and Disruption Framework, or AIMOD2, is a structured threat hunting approach to proac…☆90Sep 16, 2023Updated 2 years ago
- RRR (Rapid Response Reporting) is a collection of Incident Response Report objects. They are designed to help incident responders provid…☆37Apr 6, 2022Updated 3 years ago
- e(X)tensiable (Rust) Malware Toolkit: (Soon!) Full Featured Rust C2 Framework with Awesome Features!☆28Aug 19, 2024Updated last year
- Decloak Linux stealth rootkits hiding data with this simple memory mapped IO investigation tool.☆29Sep 29, 2025Updated 5 months ago
- Sysmon configuration file template with default high-quality event tracing☆580Jan 21, 2026Updated 2 months ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Jan 8, 2024Updated 2 years ago
- A collection of my presentation materials.☆17Apr 29, 2024Updated last year
- Power Prompt - Enhance ChatGPT & OpenAi interaction. Seamless conversations. Choose models, save templates, set temp, length & tokens.☆19Feb 15, 2023Updated 3 years ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆62Updated this week
- A pointer encryption library intended for Red Team implant design in Rust.☆66Oct 1, 2025Updated 5 months ago
- Documentation and supporting script sample for Windows Exploit Guard☆169Sep 8, 2025Updated 6 months ago
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆88Mar 11, 2026Updated last week
- A network logging tool that logs per process activities☆32Jun 13, 2023Updated 2 years ago
- 一个常用编码加解密的懒人工具,自动识别,尝试转换所有类型,包括html实体化,base64,base32,32位md5,16位md5,hash,\x,0x等十六进制格式,url编码...☆15Feb 1, 2022Updated 4 years ago
- Michael Melone's Kusto Query library☆20Nov 17, 2023Updated 2 years ago
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- Resources for the Customizing Chef book☆11Sep 12, 2014Updated 11 years ago
- SMBMap is a handy SMB enumeration tool - here with Kerberos support☆73Nov 3, 2021Updated 4 years ago
- ☆20Sep 6, 2025Updated 6 months ago
- Rust crate to run commands as another user☆54Feb 12, 2026Updated last month
- A Python package is used to execute Atomic Red Team tests (Atomics) across multiple operating system environments.☆140Jul 17, 2024Updated last year
- This is a webshell fingerprinting scanner designed to identify implants on Cisco IOS XE WebUI's affected by CVE-2023-20198 and CVE-2023-2…☆33Oct 24, 2023Updated 2 years ago
- 🛡️ SIGMA Detection Engineering Platform A comprehensive AI-powered detection engineering platform for security teams to explore MITRE AT…☆45Jun 28, 2025Updated 8 months ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆62Jul 18, 2024Updated last year
- Generic Signature Format for SIEM Systems☆18Jul 25, 2023Updated 2 years ago