A Solution For Cross-Platform Obfuscated Commands Detection presented on CIS2019 China. 动静态Bash/CMD/PowerShell命令混淆检测框架 - CIS 2019大会
☆165Aug 21, 2019Updated 6 years ago
Alternatives and similar repositories for Flerken
Users that are interested in Flerken are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Automate SSH communication with firewalls, switches, etc.☆27Mar 29, 2018Updated 7 years ago
- fireELF - Fileless Linux Malware Framework☆679Apr 17, 2019Updated 6 years ago
- A fake JDBC driver that allows OS command execution.☆125Oct 2, 2022Updated 3 years ago
- A tool to generate obfuscated one liners to aid in penetration testing☆180Jan 29, 2019Updated 7 years ago
- Cmd.exe Command Obfuscation Generator & Detection Test Harness☆932Mar 27, 2018Updated 7 years ago
- Hunt Open MongoDB instances☆79Sep 25, 2019Updated 6 years ago
- Powershell script for enumerating vulnerable DCOM Applications☆265Nov 30, 2018Updated 7 years ago
- Reverseshell Generator☆10Dec 13, 2017Updated 8 years ago
- BCS(北京网络安全大会)2019 红队行动会议重点内容☆819Sep 4, 2019Updated 6 years ago
- ssrf、ssrfIntranetFuzz、dnsRebinding、recordEncode、dnsPoisoning、Support ipv4/ipv6☆217Aug 17, 2017Updated 8 years ago
- Essential tool for finding blind injection attacks.☆49Feb 6, 2019Updated 7 years ago
- ☆128May 22, 2023Updated 2 years ago
- Framework for exploiting local vulnerabilities☆83Nov 18, 2023Updated 2 years ago
- IAST 灰盒扫描工具☆447Jul 19, 2022Updated 3 years ago
- Automatic analysis of SWF files based on some heuristics. Extensible via plugins.☆119Jun 19, 2019Updated 6 years ago
- a simple tool to detect potential security threat in php code☆316Sep 9, 2024Updated last year
- Automatically identify deserialisation issues in Java and .NET applications by using active and passive scans☆583Sep 7, 2021Updated 4 years ago
- 基于burpsuite headless 的代理式被动扫描系统☆95Feb 10, 2020Updated 6 years ago
- a PoC for Linux to get around agents that log commands being executed, without root privilege. Linux低权限模糊化执行的程序名和参数,避开基于execve系统调用监控的命令日志☆245May 8, 2019Updated 6 years ago
- Powershell script to setup windows port forwarding using native netsh client☆124Aug 6, 2018Updated 7 years ago
- 红队基础设施自动化部署工具☆852Jan 4, 2023Updated 3 years ago
- Java RMI enumeration and attack tool.☆745Sep 28, 2017Updated 8 years ago
- Windows 10 UAC bypass for all executable files which are autoelevate true .☆641Dec 9, 2019Updated 6 years ago
- Automate Metasploit scanning and exploitation☆118Jul 20, 2025Updated 8 months ago
- cobalt strike 自启动脚本☆41Mar 19, 2017Updated 9 years ago
- a hash query tool☆36Feb 12, 2019Updated 7 years ago
- Slides/Demos from the BSides Munich 2019 talk "Attacking Java RMI in 2019"☆101Sep 20, 2019Updated 6 years ago
- FCL (Fileless Command Lines) - Known command lines of fileless malicious executions☆477Apr 8, 2021Updated 4 years ago
- 一个基于docker的安全培训系统☆60Mar 15, 2021Updated 5 years ago
- 绕过专业工具检测的Webshell研究文章和免杀的Webshell☆1,733Nov 15, 2020Updated 5 years ago
- AD Security Intrusion Detection System☆1,321Mar 31, 2023Updated 2 years ago
- Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources☆1,529Jun 30, 2023Updated 2 years ago
- A Java runtime information-gathering tool which uses the Java Attach API for information acquisition☆204Apr 26, 2021Updated 4 years ago
- ☆19Mar 15, 2018Updated 8 years ago
- ☆29Jul 4, 2020Updated 5 years ago
- exp of CVE-2018-15982☆181Jan 4, 2019Updated 7 years ago
- Redis 4.x/5.x RCE☆975Nov 30, 2021Updated 4 years ago
- An easy ATT&CK-based Sysmon hunting tool, showing in Blackhat USA 2019 Arsenal☆205Apr 18, 2022Updated 3 years ago
- WINDOWS TELEMETRY权限维持☆258Jul 2, 2020Updated 5 years ago