You and the AppleLabs' Incident Response Team have been notified of a potential breach to a Human Resources' workstation. According to the Human Resources representative, they did not notice any anomalous activity while browsing the web, but the AppleLabs' system information and event management (SIEM) instance alerted on a suspicious domain. Mo…
☆77Dec 2, 2021Updated 4 years ago
Alternatives and similar repositories for Obfusc8ted
Users that are interested in Obfusc8ted are comparing it to the libraries listed below
Sorting:
- A Proof-of-Concept Layer 2 Denial of Service Attack that disrupts low level operations of Programmable Logic Controllers within industria…☆33Jan 23, 2022Updated 4 years ago
- A compilation of scripts and scans for discovering and enumerating industrial control and SCADA devices. Utilizing open-source tools, I h…☆47Mar 8, 2023Updated 2 years ago
- A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native…☆59Nov 14, 2022Updated 3 years ago
- Scripts, tools and drivers for wardriving under Mac OSX☆14Dec 7, 2016Updated 9 years ago
- Indicators of Normality☆11Jul 22, 2022Updated 3 years ago
- A curated list of Awesome Threat Intelligence resources☆50Aug 9, 2018Updated 7 years ago
- APOLOGEE is a Python script and Metasploit module that enumerates a hidden directory on Siemens APOGEE PXC BACnet Automation Controllers …☆50May 22, 2025Updated 9 months ago
- A simple Python trojan that encrypts the victim's file system and demands ransom so that an attacker can hit Taco Bell with no financial …☆14Feb 5, 2022Updated 4 years ago
- Adversary Simulation Framework☆38Aug 19, 2025Updated 6 months ago
- During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target…☆748Oct 25, 2025Updated 4 months ago
- A PowerShell incident response script for quick triage☆81Jul 18, 2022Updated 3 years ago
- Post-exploitation tool☆26Mar 7, 2021Updated 4 years ago
- A few quick recipes for those that do not have much time during the day☆22Oct 28, 2024Updated last year
- A compact and simple program targeting SIMATIC S7 Programmable Logic Controllers (PLCs) written in Go. Allowing for cross-compilation to …☆57Jan 24, 2025Updated last year
- ☆19Oct 23, 2020Updated 5 years ago
- A quick reference script that can easily display reverse shells for different languages.☆20May 28, 2020Updated 5 years ago
- A series of PowerShell scripts to automate collection of forensic artefacts in most Incident Response environments☆65Jan 31, 2022Updated 4 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Jan 14, 2021Updated 5 years ago
- ☆11Dec 13, 2021Updated 4 years ago
- A collection of handy and specific tools for the Red Teamer☆11Aug 13, 2024Updated last year
- Assorted BloodHound Cypher queries/tricks I haven't seen in other cheat sheets☆12Jun 21, 2021Updated 4 years ago
- Open source HIDS tailored for Microsoft Windows and Active Directory☆29Feb 13, 2026Updated 2 weeks ago
- Collection of Nmap scripts☆10Nov 27, 2015Updated 10 years ago
- Zenected Threat Defense VPN☆13Apr 28, 2017Updated 8 years ago
- Red Team Coin for crypto-mining operations.☆23Jan 12, 2026Updated last month
- The Atomic Playbook contains TTPs from the MITRE ATT&CK framework mapped to the tests in the Atomic Red Team. It serves as a single resou…☆34Jun 19, 2025Updated 8 months ago
- /dev/tty☆27Feb 17, 2026Updated last week
- This is a repository to house convenient things for the 2019 PCDC competition.☆13Apr 13, 2019Updated 6 years ago
- Open source alternative to Burpsuite☆15May 18, 2021Updated 4 years ago
- Execute Mimikatz with different technique☆51Nov 8, 2021Updated 4 years ago
- ☆164Oct 27, 2022Updated 3 years ago
- ☆14May 30, 2018Updated 7 years ago
- A PowerShell script to parse the docx/docm file format and update the template location.☆17Oct 15, 2019Updated 6 years ago
- This is a repository for the public blog with Labs indicators of compromise and code☆18Jan 8, 2020Updated 6 years ago
- Clean public password dump files and store in ELK☆37Jan 24, 2018Updated 8 years ago
- Some Cheat Sheet for Red Team☆18Dec 30, 2022Updated 3 years ago
- Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources☆13Jun 24, 2018Updated 7 years ago
- Sets up all the layers needed to log in over ssh with ssh keys☆17Jul 29, 2025Updated 7 months ago
- Links to malware-related YARA rules☆15Sep 29, 2022Updated 3 years ago