SofianeHamlaoui / Conti-Clear
Extracted data & informations from the Conti & TrickBot leaks.
☆14Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for Conti-Clear
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆11Updated last month
- Collection of exploits that were verified by an automated system☆13Updated 3 years ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆20Updated 4 months ago
- SecretSmasher is a Red Team tool used for brute-forcing Cisco enable passwords☆12Updated 4 years ago
- Pyfuscator is a Python tool designed to obfuscate Python scripts by encoding and encrypting them. It allows you to transform your Python …☆16Updated 3 months ago
- Hashes of infamous malware☆26Updated last year
- Some useful scripts for CobaltStrike☆10Updated 5 years ago
- Pure Honeypots with an automated bash script☆19Updated 3 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 4 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆27Updated 2 years ago
- A not so awesome list of adversary emulation gems for aspiring red/blue/purple teamers☆14Updated 2 years ago
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆15Updated 2 years ago
- Nqntnqnqmb transform maltego☆24Updated 4 years ago
- ☆42Updated 2 years ago
- ☆51Updated 3 years ago
- Repository of open source malware here on Github!☆38Updated 2 years ago
- ☆37Updated 3 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆12Updated 4 years ago
- Malicious Macro attack techniques for red teamers☆15Updated 3 years ago
- A Simple Log4j Indicator of Compromise Linux Detector☆14Updated 2 years ago
- Information Stealers Wall of Sheep (IS-WOS)☆13Updated 4 years ago
- Scan and decode NetWire logs☆11Updated 2 years ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆42Updated last year
- A collection of tools adversaries commonly use in an attack.☆14Updated this week
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)☆45Updated 3 years ago
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆31Updated last month
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆28Updated 3 years ago
- Bash Script with 4 ways to get persistence in Linux systems WITHOUT root permisions☆11Updated 2 years ago