TelefonicaTC2Tech / packagedna
This tool gives developers, researchers and companies the ability to analyze software packages of different programming languages that are being or will be used in their codes, providing information that allows them to know in advance if this library complies with processes. secure development, if currently supported, possible backdoors (malicio…
☆67Updated 3 years ago
Related projects: ⓘ
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆74Updated 2 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆36Updated 4 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆83Updated 3 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆37Updated 2 years ago
- ☆53Updated this week
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆57Updated last year
- Searching .evtx logs for remote connections☆23Updated last year
- Data exfiltration utility for testing detection capabilities☆57Updated 2 years ago
- Carbon Black Response IR tool☆53Updated 3 years ago
- OWASP Foundation Web Respository☆35Updated 3 years ago
- ☆39Updated this week
- Harvis is designed to automate your C2 Infrastructure.☆104Updated 2 years ago
- Collaborative pentest tool with highly customizable tools☆71Updated 2 years ago
- Continuous kerberoast monitor☆43Updated last year
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 2 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆104Updated 2 years ago
- ☆78Updated last year
- ☆42Updated 2 years ago
- Cobalt Strike/C2 Servers☆12Updated 3 years ago
- Analyzing AD domains for security risks related to user accounts☆63Updated last year
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆64Updated 2 years ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆65Updated 2 years ago
- CIS Benchmark testing of Windows SIEM configuration☆44Updated last year
- Lazarus analysis tools and research report☆54Updated 8 months ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆72Updated 2 years ago
- DO NOT RUN THIS.☆47Updated 2 years ago
- A tool to password spray Jenkins instances☆51Updated 5 years ago
- Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs …☆74Updated 10 months ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆30Updated last year
- ☆90Updated this week