Sh1n0g1 / ShinoBOT
RAT / Botnet Simulator for pentest / education
☆80Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for ShinoBOT
- Analyzing Rig Exploit Kit☆50Updated 7 years ago
- [BHUSA 2018 Arsenal] Integrated tool to analyze Drive-by Download attack☆107Updated last year
- A powershell script for creating a Windows honeyport.☆87Updated 9 years ago
- A collection of scripts to initialize a windows VM to run all the malwares!☆105Updated 4 years ago
- A warehouse for your malware☆133Updated 11 years ago
- Yet another AV evasion tool☆119Updated 2 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆56Updated 9 years ago
- Slides and reference material from Evading Autoruns presentation at DerbyCon 7 (September 2017)☆102Updated 3 years ago
- ☆68Updated 7 years ago
- Cuckoo Sandbox plugin for extracts configuration data of known malware☆135Updated 11 months ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆65Updated 5 years ago
- Tool for dropping malware from EK☆41Updated 6 years ago
- A few simple scripts and templates I have used during various phishing engagements.☆60Updated 9 years ago
- This is a pack of Cortana scripts commonly used on our pentests.☆68Updated 9 years ago
- Powershell Empire Persistence finder☆117Updated 7 years ago
- Fileless Ransomware Example☆35Updated 7 years ago
- ☆85Updated 9 years ago
- ☆75Updated last year
- NCC Group Ransomware Simulator☆68Updated 8 years ago
- Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malici…☆80Updated 7 years ago
- The AwesomerShell Code Sample☆49Updated 8 years ago
- DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.☆146Updated 6 years ago
- ☆59Updated 5 years ago
- PowerShell script to retreive wifi ESSIDs and Passwords.☆26Updated 7 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Updated 7 years ago
- Pivoter is a proxy tool for pentesters to have easier lateral movement.☆139Updated 9 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆32Updated 9 years ago
- An offensive Powershell console☆30Updated 8 years ago