Shell-Company / Noirgate
NoirGate provides on-demand ephemeral anonymous shells secured by TOTP
☆33Updated 11 months ago
Alternatives and similar repositories for Noirgate:
Users that are interested in Noirgate are comparing it to the libraries listed below
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated 10 months ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆52Updated 5 months ago
- Detect and remove the presence of canary tokens☆20Updated last year
- Simple S3 Bucket Testing Software☆31Updated 3 years ago
- ☆28Updated 2 months ago
- Continuous kerberoast monitor☆44Updated last year
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆51Updated last year
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆63Updated 2 years ago
- PlasmaPup is designed to help central and departmental IT personnel understand their exposures in Active Directory by showing which accou…☆27Updated 11 months ago
- List of Red Team Resources☆17Updated 4 years ago
- Spins up a docker container with several useful tools for offensive security in macOS/cloud environments. Also installs the needed depend…☆17Updated 3 years ago
- Dont Gamble with Risk☆14Updated last year
- sudo-parser is a tool to audit complex sudoers files☆17Updated 2 years ago
- A simple bastion host setup designed for cloud-hosted lab environments.☆28Updated 4 years ago
- RustHunter is a modular incident response framework based on Rust and Ansible to build and compare environmental baselines.☆18Updated 2 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- self-hosted Azure OSINT tool☆29Updated 6 months ago
- ☆15Updated 2 years ago
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago
- Next Generation Phishing Tool For Internal / Red Teams☆35Updated 5 years ago
- ☆58Updated last year
- python3 scripts to help with aws triage needs☆15Updated 3 years ago
- Escaping Restricted Environments and Bypassing DLP☆69Updated 6 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- A PowerShell script that checks for dangerous ACLs on system hives and shadows☆28Updated 3 years ago
- Red team oriented key finder and correlator☆16Updated last year
- Analytics for Accounting logs from Network devices☆17Updated 4 years ago
- Splunk Technology-AddOn for Aurora Sigma-Based EDR Agent. It helps parse and configure the necessary inputs to neatly consume Aurora EDR …☆13Updated 2 years ago
- ☆54Updated last year
- Rapidly building a Windows 10 system to use for dynamic malware analysis (sandbox), sending data to Elastic Cloud.☆48Updated last year