Shell-Company / Noirgate
NoirGate provides on-demand ephemeral anonymous shells secured by TOTP
☆31Updated 6 months ago
Related projects ⓘ
Alternatives and complementary repositories for Noirgate
- ☆15Updated 4 months ago
- Spins up a docker container with several useful tools for offensive security in macOS/cloud environments. Also installs the needed depend…☆16Updated 3 years ago
- Dont Gamble with Risk☆14Updated 8 months ago
- Automated Persistence and Lateral Movement using GCP Patch Management☆14Updated 2 years ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated 6 months ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆50Updated last year
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆21Updated 3 years ago
- Stupid Simple Detection Testing☆11Updated 8 months ago
- python3 scripts to help with aws triage needs☆15Updated 2 years ago
- PlasmaPup is designed to help central and departmental IT personnel understand their exposures in Active Directory by showing which accou…☆27Updated 7 months ago
- sudo-parser is a tool to audit complex sudoers files☆17Updated 2 years ago
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆26Updated 2 years ago
- ☆15Updated 2 years ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆28Updated 7 months ago
- Convert Nmap output for integration with other Project Discovery tools☆14Updated last year
- Collection of Tools & Techniques for analyzing URLs☆30Updated last year
- Detect and remove the presence of canary tokens☆19Updated 11 months ago
- A collection of scripts for the purpose of gathering open source intelligence, to be presented at GrayHat, BSides Denver, and Information…☆24Updated 3 years ago
- Paradigm is an open source tool that looks at your network landscape and determines what is actually accessible via the internet.☆19Updated last year
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆31Updated 7 months ago
- A simple way to exfiltrate data using spotify API☆18Updated this week
- Next Generation Phishing Tool For Internal / Red Teams☆35Updated 5 years ago
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆36Updated 8 months ago
- An Ubuntu 18.04 box for Mythic C2 framework development☆16Updated 2 years ago
- Continuous kerberoast monitor☆44Updated last year
- Exfiltration based on custom X509 certificates☆26Updated 8 months ago
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago
- Virtual Security Operations Center☆49Updated last year
- Finding sensitive information in the trimmed parts of cropped images☆28Updated 2 years ago