information about ransomware groups (Ransomware Analysis Notes)
☆41Dec 26, 2023Updated 2 years ago
Alternatives and similar repositories for Shadow-Pulse
Users that are interested in Shadow-Pulse are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Powershell Scripts for Blue Team members☆11Dec 1, 2023Updated 2 years ago
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Mar 11, 2025Updated last year
- ☆35Dec 21, 2023Updated 2 years ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Oct 12, 2024Updated last year
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆61Nov 22, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Exploit for CVE-2024-3273, supports single and multiple hosts☆13Apr 7, 2024Updated 2 years ago
- This is the ringzer0 writeup of web exploitation catagery. The name is "Word mean something"☆14Dec 8, 2023Updated 2 years ago
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.☆20Feb 2, 2024Updated 2 years ago
- Burp extension to track your current IP address. Extension focused for red teams where the attacker needs to log all used IP addresses.☆26Nov 2, 2025Updated 6 months ago
- A GUI wrapper inside of Havoc to interact with bloodhound CE☆71Feb 3, 2024Updated 2 years ago
- Atlassian Companion RCE Vulnerability Proof of Concept☆25Dec 15, 2023Updated 2 years ago
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆84Dec 20, 2023Updated 2 years ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆115Oct 22, 2021Updated 4 years ago
- A tool that adds reproducible UUIDs to YARA rules☆13Updated this week
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Real-time updated lists of U.S. GovCloud IP ranges on Amazon AWS, Microsoft Azure, Google GCP☆17Dec 6, 2024Updated last year
- Easy way to run a LLVM instrumented kernel in qemu with gdb☆23Apr 19, 2024Updated 2 years ago
- A utility that can be used to launch an executable with a DLL injected☆19Nov 20, 2023Updated 2 years ago
- A Post-exploitation Toolset for Interacting with the Microsoft Graph API☆15Nov 16, 2023Updated 2 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆66Mar 6, 2024Updated 2 years ago
- [IJCAI 2024] Imperio is an LLM-powered backdoor attack. It allows the adversary to issue language-guided instructions to control the vict…☆44Feb 18, 2025Updated last year
- ☆74Apr 8, 2024Updated 2 years ago
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆28Jul 15, 2024Updated last year
- A vSphere deployment of GOADv2 BETA Testing (v0.1)☆26Dec 22, 2023Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- The source code (including datasets) of V1SCAN (USENIX Security 2023; will be uploaded).☆41Nov 4, 2023Updated 2 years ago
- A CIA tradecraft technique to asynchronously detect when a process is created using WMI.☆139Feb 2, 2026Updated 3 months ago
- SRE - Dissecting Malware for Static Analysis & the Complete Command-line Tool☆58Dec 29, 2024Updated last year
- Nmapurls parses Nmap xml reports from either piped input or command line arg and outputs a list of http(s) URL's to be used in an automat…☆44Jun 15, 2025Updated 11 months ago
- Monarch - The Adversary Emulation Toolkit☆64Jan 7, 2025Updated last year
- [CVE-2024-4956] Nexus Repository Manager 3 Unauthenticated Path Traversal Bulk Scanner☆17Sep 26, 2024Updated last year
- A list of RMMs designed to be used in automation to build alerts☆119Nov 9, 2025Updated 6 months ago
- A simple rpc2socks alternative in pure Go.☆31Jul 8, 2024Updated last year
- IOCs and detection script for COATHANGER malware☆55Feb 7, 2024Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆65Apr 28, 2024Updated 2 years ago
- IDA Python scripts☆42Apr 11, 2025Updated last year
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆41Nov 12, 2023Updated 2 years ago
- CVE-2023-7028☆58Jan 12, 2024Updated 2 years ago
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Feb 6, 2024Updated 2 years ago
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆37Nov 16, 2023Updated 2 years ago
- Slides and materials for conference presentations☆11Jun 4, 2023Updated 2 years ago