information about ransomware groups (Ransomware Analysis Notes)
☆41Dec 26, 2023Updated 2 years ago
Alternatives and similar repositories for Shadow-Pulse
Users that are interested in Shadow-Pulse are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Powershell Scripts for Blue Team members☆11Dec 1, 2023Updated 2 years ago
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Mar 11, 2025Updated last year
- ☆35Dec 21, 2023Updated 2 years ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Oct 12, 2024Updated last year
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆61Nov 22, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Exploit for CVE-2024-3273, supports single and multiple hosts☆13Apr 7, 2024Updated 2 years ago
- This is the ringzer0 writeup of web exploitation catagery. The name is "Word mean something"☆14Dec 8, 2023Updated 2 years ago
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.☆20Feb 2, 2024Updated 2 years ago
- Burp extension to track your current IP address. Extension focused for red teams where the attacker needs to log all used IP addresses.☆26Nov 2, 2025Updated 5 months ago
- A GUI wrapper inside of Havoc to interact with bloodhound CE☆71Feb 3, 2024Updated 2 years ago
- Atlassian Companion RCE Vulnerability Proof of Concept☆25Dec 15, 2023Updated 2 years ago
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆83Dec 20, 2023Updated 2 years ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆115Oct 22, 2021Updated 4 years ago
- A tool that adds reproducible UUIDs to YARA rules☆13Apr 24, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Real-time updated lists of U.S. GovCloud IP ranges on Amazon AWS, Microsoft Azure, Google GCP☆18Dec 6, 2024Updated last year
- Easy way to run a LLVM instrumented kernel in qemu with gdb☆23Apr 19, 2024Updated last year
- A utility that can be used to launch an executable with a DLL injected☆19Nov 20, 2023Updated 2 years ago
- A Post-exploitation Toolset for Interacting with the Microsoft Graph API☆15Nov 16, 2023Updated 2 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆66Mar 6, 2024Updated 2 years ago
- [IJCAI 2024] Imperio is an LLM-powered backdoor attack. It allows the adversary to issue language-guided instructions to control the vict…☆44Feb 18, 2025Updated last year
- ☆74Apr 8, 2024Updated 2 years ago
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆28Jul 15, 2024Updated last year
- Queries from the blog posts.☆15Oct 6, 2024Updated last year
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- A vSphere deployment of GOADv2 BETA Testing (v0.1)☆26Dec 22, 2023Updated 2 years ago
- The source code (including datasets) of V1SCAN (USENIX Security 2023; will be uploaded).☆41Nov 4, 2023Updated 2 years ago
- A CIA tradecraft technique to asynchronously detect when a process is created using WMI.☆139Feb 2, 2026Updated 2 months ago
- SRE - Dissecting Malware for Static Analysis & the Complete Command-line Tool☆57Dec 29, 2024Updated last year
- Nmapurls parses Nmap xml reports from either piped input or command line arg and outputs a list of http(s) URL's to be used in an automat…☆43Jun 15, 2025Updated 9 months ago
- Monarch - The Adversary Emulation Toolkit☆64Jan 7, 2025Updated last year
- [CVE-2024-4956] Nexus Repository Manager 3 Unauthenticated Path Traversal Bulk Scanner☆17Sep 26, 2024Updated last year
- A list of RMMs designed to be used in automation to build alerts☆117Nov 9, 2025Updated 5 months ago
- A simple rpc2socks alternative in pure Go.☆31Jul 8, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- IOCs and detection script for COATHANGER malware☆55Feb 7, 2024Updated 2 years ago
- ☆65Apr 28, 2024Updated last year
- IDA Python scripts☆42Apr 11, 2025Updated 11 months ago
- Web Path Finder☆60Nov 22, 2023Updated 2 years ago
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆41Nov 12, 2023Updated 2 years ago
- CVE-2023-7028☆58Jan 12, 2024Updated 2 years ago
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Feb 6, 2024Updated 2 years ago