A Solution For Cross-Platform Obfuscated Commands Detection presented on CIS2019 China. 动静态Bash/CMD/PowerShell命令混淆检测框架 - CIS 2019大会
☆165Aug 21, 2019Updated 6 years ago
Alternatives and similar repositories for Flerken
Users that are interested in Flerken are comparing it to the libraries listed below
Sorting:
- fireELF - Fileless Linux Malware Framework☆679Apr 17, 2019Updated 6 years ago
- A tool to generate obfuscated one liners to aid in penetration testing☆180Jan 29, 2019Updated 7 years ago
- Automate SSH communication with firewalls, switches, etc.☆27Mar 29, 2018Updated 7 years ago
- Powershell script for enumerating vulnerable DCOM Applications☆266Nov 30, 2018Updated 7 years ago
- A fake JDBC driver that allows OS command execution.☆125Oct 2, 2022Updated 3 years ago
- ☆29Jul 4, 2020Updated 5 years ago
- Cmd.exe Command Obfuscation Generator & Detection Test Harness☆928Mar 27, 2018Updated 7 years ago
- ☆19Mar 15, 2018Updated 7 years ago
- ☆128May 22, 2023Updated 2 years ago
- Hunt Open MongoDB instances☆79Sep 25, 2019Updated 6 years ago
- Automatic analysis of SWF files based on some heuristics. Extensible via plugins.☆120Jun 19, 2019Updated 6 years ago
- ssrf、ssrfIntranetFuzz、dnsRebinding、recordEncode、dnsPoisoning、Support ipv4/ipv6☆217Aug 17, 2017Updated 8 years ago
- Automatically identify deserialisation issues in Java and .NET applications by using active and passive scans☆584Sep 7, 2021Updated 4 years ago
- Essential tool for finding blind injection attacks.☆49Feb 6, 2019Updated 7 years ago
- ☆18Jul 3, 2020Updated 5 years ago
- Real Time Threat Monitoring Tool☆114Nov 16, 2022Updated 3 years ago
- Reverseshell Generator☆10Dec 13, 2017Updated 8 years ago
- Assortment of IDA scripts for an assortment of game consoles, PS2, PS4, etc☆11Feb 26, 2021Updated 5 years ago
- Powershell script to setup windows port forwarding using native netsh client☆124Aug 6, 2018Updated 7 years ago
- BCS(北京网络安全大会)2019 红队行动会议重点内容☆819Sep 4, 2019Updated 6 years ago
- Framework for exploiting local vulnerabilities☆83Nov 18, 2023Updated 2 years ago
- Windows 10 UAC bypass for all executable files which are autoelevate true .☆642Dec 9, 2019Updated 6 years ago
- Salsa Tools - ShellReverse TCP/UDP/ICMP/DNS/SSL/BINDTCP/Shellcode/SILENTTRINITY and AV bypass, AMSI patched☆584Jan 31, 2020Updated 6 years ago
- Java RMI enumeration and attack tool.☆743Sep 28, 2017Updated 8 years ago
- PowerShell and Cobalt Strike scripts for lateral movement using Excel 4.0 / XLM macros via DCOM (direct shellcode injection in Excel.exe)☆328Mar 26, 2019Updated 6 years ago
- Web Crawler, Scanner, and Analyzer Framework (Shell-Script based)☆101Jun 20, 2019Updated 6 years ago
- FCL (Fileless Command Lines) - Known command lines of fileless malicious executions☆477Apr 8, 2021Updated 4 years ago
- 一个基于docker的安全培训系统☆60Mar 15, 2021Updated 4 years ago
- PeekABoo tool can be used during internal penetration testing when a user needs to enable Remote Desktop on the targeted machine. It uses…☆141Apr 29, 2019Updated 6 years ago
- a hash query tool☆36Feb 12, 2019Updated 7 years ago
- Machinae Security Intelligence Collector☆539May 15, 2024Updated last year
- exp of CVE-2018-15982☆181Jan 4, 2019Updated 7 years ago
- Some .ps1 scripts for pentesting☆140Jan 6, 2026Updated last month
- File Decrypter for the PS4 version 4.05☆16Jan 5, 2018Updated 8 years ago
- DNS Enumeration with Asynchronicity☆45Oct 30, 2018Updated 7 years ago
- The fastest way to build beautiful Electron apps using simple HTML and CSS☆10Jul 22, 2017Updated 8 years ago
- Timelapse Rail Control System☆12Aug 27, 2017Updated 8 years ago
- Emblem.js precompiler plugin for gulp☆10Mar 24, 2023Updated 2 years ago
- DigitalOcean API PHP 5.3+ library for Laravel 4☆19Dec 17, 2014Updated 11 years ago