TelefonicaTC2Tech / packagedna
This tool gives developers, researchers and companies the ability to analyze software packages of different programming languages that are being or will be used in their codes, providing information that allows them to know in advance if this library complies with processes. secure development, if currently supported, possible backdoors (malicio…
☆68Updated 3 years ago
Alternatives and similar repositories for packagedna:
Users that are interested in packagedna are comparing it to the libraries listed below
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- NSE script to detect ProxyOracle☆14Updated 3 years ago
- Carbon Black Response IR tool☆53Updated 4 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆36Updated 5 years ago
- OWASP Foundation Web Respository☆36Updated 3 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆91Updated 3 years ago
- CVE-2020-16899 - Microsoft Windows TCP/IP Vulnerability Detection Logic and Rule☆21Updated 4 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆106Updated 2 years ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆69Updated 3 years ago
- Collaborative pentest tool with highly customizable tools☆74Updated 3 years ago
- ☆42Updated 3 weeks ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Updated 2 years ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆114Updated 3 years ago
- Data exfiltration and covert communication tool☆38Updated 2 years ago
- ATLAS - Malware Analysis Description☆20Updated last year
- Pointer was developed for massive hunting and mapping Cobalt Strike servers exposed on the internet.☆65Updated 3 years ago
- ☆41Updated last year
- client-side prototype pullution vulnerability scanner☆46Updated 3 years ago
- Detecting Cobalt Strike Team Servers on targets through traffic telemetry.☆21Updated 8 months ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- GoldenSAML Attack Libraries and Framework☆73Updated 10 months ago
- Continuous kerberoast monitor☆45Updated last year
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆49Updated 3 years ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated 2 years ago
- Searching .evtx logs for remote connections☆23Updated last year
- Default plugins for Jaeles Scanner☆33Updated 4 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 3 years ago
- Red Teaming & Active Directory Cheat Sheet.☆40Updated last year
- Triaging Windows event logs based on SANS Poster☆39Updated 2 years ago