You and the AppleLabs' Incident Response Team have been notified of a potential breach to a Human Resources' workstation. According to the Human Resources representative, they did not notice any anomalous activity while browsing the web, but the AppleLabs' system information and event management (SIEM) instance alerted on a suspicious domain. Mo…
☆77Dec 2, 2021Updated 4 years ago
Alternatives and similar repositories for Obfusc8ted
Users that are interested in Obfusc8ted are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Generates a flood of Router Advertisements (RA) with random source MAC addresses and IPv6 prefixes. Computers, which have stateless autoc…☆106Nov 6, 2023Updated 2 years ago
- A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native…☆59Nov 14, 2022Updated 3 years ago
- A compilation of scripts and scans for discovering and enumerating industrial control and SCADA devices. Utilizing open-source tools, I h…☆48Mar 8, 2023Updated 3 years ago
- APOLOGEE is a Python script and Metasploit module that enumerates a hidden directory on Siemens APOGEE PXC BACnet Automation Controllers …☆50May 22, 2025Updated 11 months ago
- A compact and simple program targeting SIMATIC S7 Programmable Logic Controllers (PLCs) written in Go. Allowing for cross-compilation to …☆58Jan 24, 2025Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target…☆750Oct 25, 2025Updated 6 months ago
- Scripts, tools and drivers for wardriving under Mac OSX☆14Dec 7, 2016Updated 9 years ago
- just manipulatin these here tokens yes sir nothing weird☆21Apr 18, 2022Updated 4 years ago
- A curated list of Awesome Threat Intelligence resources☆50Aug 9, 2018Updated 7 years ago
- Indicators of Normality☆11Jul 22, 2022Updated 3 years ago
- Adversary Simulation Framework☆40Aug 19, 2025Updated 8 months ago
- Post-exploitation tool☆26Mar 7, 2021Updated 5 years ago
- A few quick recipes for those that do not have much time during the day☆22Oct 28, 2024Updated last year
- A tool to curate compelling news on cloud technologies and cybersecurity. By aggregating information from RSS feeds and Reddit, it identi…☆35Aug 15, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆20Oct 23, 2020Updated 5 years ago
- A tool for auditing network shares in an Active Directory environment☆44Apr 29, 2019Updated 7 years ago
- Open source alternative to Burpsuite☆16May 18, 2021Updated 4 years ago
- Open source HIDS tailored for Microsoft Windows and Active Directory☆31Feb 13, 2026Updated 2 months ago
- ScrapPY is a Python utility for scraping manuals, documents, and other sensitive PDFs to generate wordlists that can be utilized by offen…☆223May 2, 2025Updated 11 months ago
- Collection of Nmap scripts☆10Nov 27, 2015Updated 10 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Jan 14, 2021Updated 5 years ago
- Useful Techniques, Tactics, and Procedures for red teamers and defenders, alike!☆1,864Updated this week
- Zenected Threat Defense VPN☆13Apr 28, 2017Updated 9 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A PowerShell incident response script for quick triage☆81Jul 18, 2022Updated 3 years ago
- Cyber threat intelligence tool suite.☆41Apr 3, 2025Updated last year
- Tools for the Computer Incident Response Team☆150Apr 17, 2017Updated 9 years ago
- A quick reference script that can easily display reverse shells for different languages.☆20May 28, 2020Updated 5 years ago
- ☆14May 30, 2018Updated 7 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Aug 19, 2015Updated 10 years ago
- 𝘔𝘢𝘯𝘺 𝘰𝘧 𝘵𝘩𝘦𝘴𝘦 𝘴𝘤𝘳𝘪𝘱𝘵𝘴 𝘢𝘳𝘦 𝘤𝘰𝘭𝘭𝘦𝘤𝘵𝘦𝘥 𝘧𝘳𝘰𝘮 𝘤𝘰𝘶𝘳𝘴𝘦𝘴, 𝘣𝘭𝘰𝘨𝘴, 𝘤𝘰𝘮𝘮𝘶𝘯𝘪𝘵𝘺 𝘳𝘦𝘴𝘰𝘶𝘳𝘤�…☆28Nov 30, 2025Updated 5 months ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆139Feb 14, 2025Updated last year
- Open-Source PowerShell module to allow online play of Backdoors & Breaches card game devised by Black Hills Information Security☆56Mar 13, 2021Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A collection of infosec related scripts and information.☆54Oct 2, 2024Updated last year
- Beacon Kibana Executable Report. Aggregates Sysmon Network Events With Elasticsearch and Kibana☆303Mar 19, 2026Updated last month
- Loading and executing shellcode in C# without PInvoke.☆22Jan 10, 2022Updated 4 years ago
- Red Team Coin for crypto-mining operations.☆24Mar 1, 2026Updated last month
- Assorted BloodHound Cypher queries/tricks I haven't seen in other cheat sheets☆12Jun 21, 2021Updated 4 years ago
- ☆15Feb 1, 2019Updated 7 years ago
- A PowerShell script to parse the docx/docm file format and update the template location.☆16Oct 15, 2019Updated 6 years ago