Ud0g-Py / Killing-The-BearView external linksLinks
Repository and archive for Killing The Bear Gitbook
☆83Aug 15, 2023Updated 2 years ago
Alternatives and similar repositories for Killing-The-Bear
Users that are interested in Killing-The-Bear are comparing it to the libraries listed below
Sorting:
- vusialization of geo points from photos from vk profile☆48Feb 16, 2022Updated 3 years ago
- Rust Weaponization for Red Team Engagements.☆12Nov 14, 2022Updated 3 years ago
- An End to End Encrypted SMS and SMS Tunneling app☆40Apr 27, 2023Updated 2 years ago
- PoC + vulnerability details for CVE-2022-25262 / JetBrains Hub single-click SAML response takeover☆16Jul 5, 2022Updated 3 years ago
- Code and result files (models, etc.) related to Metadata Digger's parts using Artificial Intelligence methods.☆12Feb 4, 2020Updated 6 years ago
- 🌵 Command and Action routine Server☆16Updated this week
- A python app using kivy and pynput to log and upload mouse dynamics.☆27Apr 24, 2022Updated 3 years ago
- The Hack3r News B'darija☆18Jan 1, 2023Updated 3 years ago
- ☆133Oct 14, 2022Updated 3 years ago
- Ransomware simulation script written in PowerShell. Useful for testing your defenses and backups against real ransomware-like activity in…☆238Oct 14, 2024Updated last year
- pyCobaltHound is an Aggressor script extension for Cobalt Strike which aims to provide a deep integration between Cobalt Strike and Blood…☆135May 25, 2023Updated 2 years ago
- Find Microsoft Exchange instance for a given domain and identify the exact version☆188Jan 30, 2023Updated 3 years ago
- Maximizing BloodHound. Max is a good boy.☆531Apr 25, 2025Updated 9 months ago
- List of Hardware Wallets for Digital Forensics☆26Dec 19, 2024Updated last year
- Malware vulnerability intel tool for third-party attackers☆122Oct 24, 2024Updated last year
- Yandex browser password recovery☆11Apr 9, 2025Updated 10 months ago
- A list of tools that handle different data and make it usable in Maltego.☆266Nov 9, 2024Updated last year
- ☆96May 5, 2025Updated 9 months ago
- Notes and IoCs of fresh malware☆61Jul 5, 2024Updated last year
- Framework for Telegram users and chats investigating☆75Jun 5, 2025Updated 8 months ago
- Make an executable run with TrustedInstaller permissions under SYSTEM account.☆46Nov 16, 2020Updated 5 years ago
- Machine learning face recognition combined with a drone and osint tools☆43Jun 15, 2020Updated 5 years ago
- ☆69May 3, 2021Updated 4 years ago
- Placeholder for my detection repo and misc detection engineering content☆42Oct 20, 2023Updated 2 years ago
- An other No-Fix LPE, NTLMRelay2Self over HTTP (Webdav).☆417Jan 27, 2024Updated 2 years ago
- ☆138Apr 20, 2023Updated 2 years ago
- A template for standard Maltego transformation☆13Dec 8, 2021Updated 4 years ago
- ☆11Mar 16, 2022Updated 3 years ago
- Hunting Newly Registered Domains☆10Jan 6, 2019Updated 7 years ago
- Forensic Analysis of Signal, Wickr, Threema - Decrypt all databases and multimedia files☆76Jan 10, 2022Updated 4 years ago
- Query GraphSense clusters, details and attribution tag-packs directly in Maltego. By an initial idea of our Swiss Federal Police colleag…☆36Dec 28, 2024Updated last year
- Redeye is a tool intended to help you manage your data during a pentest operation☆473Aug 21, 2024Updated last year
- Command line utility for APK fingerprinting☆13Jan 10, 2023Updated 3 years ago
- A script to download OUI data from the IEEE and parse it into the nmap-mac-prefixes file so Nmap has the latest OUI data.☆12Jun 8, 2022Updated 3 years ago
- A tool written in Go that scans files & directories for the Follina exploit (CVE-2022-30190)☆23Sep 13, 2022Updated 3 years ago
- MAL-CL (Malicious Command-Line)☆322Jan 10, 2023Updated 3 years ago
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆57Jun 13, 2024Updated last year
- It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography …☆418Jun 17, 2022Updated 3 years ago
- Windows internals and exploitation tricks☆112Nov 9, 2025Updated 3 months ago