TelefonicaTC2Tech / packagednaLinks
This tool gives developers, researchers and companies the ability to analyze software packages of different programming languages that are being or will be used in their codes, providing information that allows them to know in advance if this library complies with processes. secure development, if currently supported, possible backdoors (malicio…
☆68Updated 3 years ago
Alternatives and similar repositories for packagedna
Users that are interested in packagedna are comparing it to the libraries listed below
Sorting:
- NSE script to detect ProxyOracle☆14Updated 3 years ago
- OWASP Foundation Web Respository☆36Updated 3 years ago
- Harvis is designed to automate your C2 Infrastructure.☆108Updated 2 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆37Updated 5 years ago
- PyQT5 app for LOLBAS and GTFOBins☆45Updated 3 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆96Updated 3 years ago
- An Ansible role for installing Cobalt Strike.☆78Updated last week
- client-side prototype pullution vulnerability scanner☆46Updated 3 years ago
- A tool to password spray Jenkins instances☆57Updated 6 years ago
- Terraform resources for building HTTP, DNS, phishing, and mail server red team infrastructure☆94Updated 6 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Updated 2 years ago
- Continuous kerberoast monitor☆45Updated last year
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆105Updated 3 years ago
- A small POC of using Azure Functions to relay communications. Feel free to add additional functionality beyond this POC!☆76Updated 2 years ago
- Any presentation we've given at FortyNorth Security☆34Updated 3 years ago
- Azur3Alph4 is a PowerShell module that automates red-team tasks for ops on objective. This module situates in a post-breach (RCE achieved…☆63Updated 3 years ago
- Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs …☆75Updated last year
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- CIS Benchmark testing of Windows SIEM configuration☆44Updated 2 years ago
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆44Updated 4 years ago
- Windows TCPIP Finger Command / C2 Channel and Bypassing Security Software☆67Updated last year
- ☆80Updated 2 years ago
- Collaborative pentest tool with highly customizable tools☆74Updated 3 years ago
- Escaping Restricted Environments and Bypassing DLP☆73Updated 6 years ago
- Analyzing AD domains for security risks related to user accounts☆64Updated 2 years ago
- "Powershell script assisting with domain enumerating and in finding quick wins" - Basically written while doing the 'Advanced Red Team' l…☆81Updated 3 years ago
- ☆19Updated 4 years ago