You and the AppleLabs' Incident Response Team have been notified of a potential breach to a Human Resources' workstation. According to the Human Resources representative, they did not notice any anomalous activity while browsing the web, but the AppleLabs' system information and event management (SIEM) instance alerted on a suspicious domain. Mo…
☆77Dec 2, 2021Updated 4 years ago
Alternatives and similar repositories for Obfusc8ted
Users that are interested in Obfusc8ted are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Generates a flood of Router Advertisements (RA) with random source MAC addresses and IPv6 prefixes. Computers, which have stateless autoc…☆105Nov 6, 2023Updated 2 years ago
- A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native…☆59Nov 14, 2022Updated 3 years ago
- A compilation of scripts and scans for discovering and enumerating industrial control and SCADA devices. Utilizing open-source tools, I h…☆48Mar 8, 2023Updated 3 years ago
- A compact and simple program targeting SIMATIC S7 Programmable Logic Controllers (PLCs) written in Go. Allowing for cross-compilation to …☆57Jan 24, 2025Updated last year
- /dev/tty☆29Mar 31, 2026Updated last week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target…☆751Oct 25, 2025Updated 5 months ago
- Scripts, tools and drivers for wardriving under Mac OSX☆14Dec 7, 2016Updated 9 years ago
- just manipulatin these here tokens yes sir nothing weird☆21Apr 18, 2022Updated 3 years ago
- A curated list of Awesome Threat Intelligence resources☆50Aug 9, 2018Updated 7 years ago
- Indicators of Normality☆11Jul 22, 2022Updated 3 years ago
- Post-exploitation tool☆26Mar 7, 2021Updated 5 years ago
- A few quick recipes for those that do not have much time during the day☆22Oct 28, 2024Updated last year
- A tool to curate compelling news on cloud technologies and cybersecurity. By aggregating information from RSS feeds and Reddit, it identi…☆35Aug 15, 2024Updated last year
- ☆11Dec 13, 2021Updated 4 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- A tool for auditing network shares in an Active Directory environment☆44Apr 29, 2019Updated 6 years ago
- A series of PowerShell scripts to automate collection of forensic artefacts in most Incident Response environments☆65Jan 31, 2022Updated 4 years ago
- A collection of handy and specific tools for the Red Teamer☆11Aug 13, 2024Updated last year
- ☆164Oct 27, 2022Updated 3 years ago
- ScrapPY is a Python utility for scraping manuals, documents, and other sensitive PDFs to generate wordlists that can be utilized by offen…☆223May 2, 2025Updated 11 months ago
- Collection of Nmap scripts☆10Nov 27, 2015Updated 10 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Jan 14, 2021Updated 5 years ago
- SIEM Detection Use Case Library mapped to MITRE ATT&CK tactics and techniques☆12Oct 28, 2018Updated 7 years ago
- Useful Techniques, Tactics, and Procedures for red teamers and defenders, alike!☆1,860Updated this week
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- A PowerShell incident response script for quick triage☆81Jul 18, 2022Updated 3 years ago
- Tools for the Computer Incident Response Team☆150Apr 17, 2017Updated 8 years ago
- A quick reference script that can easily display reverse shells for different languages.☆20May 28, 2020Updated 5 years ago
- ☆14May 30, 2018Updated 7 years ago
- ☆12Jun 29, 2021Updated 4 years ago
- Execute Mimikatz with different technique☆51Nov 8, 2021Updated 4 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Aug 19, 2015Updated 10 years ago
- 𝘔𝘢𝘯𝘺 𝘰𝘧 𝘵𝘩𝘦𝘴𝘦 𝘴𝘤𝘳𝘪𝘱𝘵𝘴 𝘢𝘳𝘦 𝘤𝘰𝘭𝘭𝘦𝘤𝘵𝘦𝘥 𝘧𝘳𝘰𝘮 𝘤𝘰𝘶𝘳𝘴𝘦𝘴, 𝘣𝘭𝘰𝘨𝘴, 𝘤𝘰𝘮𝘮𝘶𝘯𝘪𝘵𝘺 𝘳𝘦𝘴𝘰𝘶𝘳𝘤�…☆28Nov 30, 2025Updated 4 months ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆139Feb 14, 2025Updated last year
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Open-Source PowerShell module to allow online play of Backdoors & Breaches card game devised by Black Hills Information Security☆56Mar 13, 2021Updated 5 years ago
- This is a Docker Container with a script to crack pcap files with Hashcat. The aim of the project is to automate the processing of Hashes…☆11Jan 31, 2021Updated 5 years ago
- Beacon Kibana Executable Report. Aggregates Sysmon Network Events With Elasticsearch and Kibana☆302Mar 19, 2026Updated 3 weeks ago
- Loading and executing shellcode in C# without PInvoke.☆22Jan 10, 2022Updated 4 years ago
- Red Team Coin for crypto-mining operations.☆23Mar 1, 2026Updated last month
- A collection of infosec related scripts and information.☆54Oct 2, 2024Updated last year
- Assorted BloodHound Cypher queries/tricks I haven't seen in other cheat sheets☆12Jun 21, 2021Updated 4 years ago