Whitecat18 / vxug-scraperLinks
☆53Updated 3 months ago
Alternatives and similar repositories for vxug-scraper
Users that are interested in vxug-scraper are comparing it to the libraries listed below
Sorting:
- Tool designed to exfiltrate OneDrive Business OCR Data☆124Updated 9 months ago
- Modular framework for automating triaging, malware analysis, and analyst workflows☆43Updated 6 months ago
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆53Updated 8 months ago
- Bubble.io security research: 0day / exploiting elasticsearch implementation / Research by: Lucca & Pedro☆78Updated 7 months ago
- ☆71Updated 9 months ago
- macos stealer poc☆129Updated 4 months ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆128Updated 7 months ago
- ☆49Updated 8 months ago
- ☆129Updated 5 months ago
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆82Updated last year
- The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.☆300Updated this week
- ☆43Updated 10 months ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆88Updated 8 months ago
- A collection of tools that I use in CTF's or for assessments☆102Updated 9 months ago
- Lockbit, URSIF, BlackBasta etc.☆140Updated 3 weeks ago
- Some useful books related to Cybersecurity, Linux and more.☆60Updated 4 months ago
- ShadowPhish is an advanced APT awareness toolkit designed to simulate real-world phishing, malware delivery, deepfakes, smishing/vishing,…☆213Updated 7 months ago
- A curated list of awesome LOLBins, GTFO projects, and similar 'Living Off the Land' security resources.☆202Updated last year
- Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supporte…☆195Updated 2 months ago
- Linux post exploitation tool for info gathering and exfiltration 🐧📡💀☆89Updated last week
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆122Updated 10 months ago
- This is practice VM for malware development☆134Updated last week
- ☆164Updated 8 months ago
- Exposing CharmingKitten's malicious activity for IRGC-IO Counterintelligence division (1500)☆367Updated 3 weeks ago
- Keklick - C2 Hunting, Reporting and Visualization Tool☆63Updated 3 months ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆203Updated 8 months ago
- specialized investigative framework to investigate cases of malicious actors in the OSINT and backup dark forums.☆65Updated 3 months ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆124Updated last year
- ☆65Updated last year
- Mavoc is an Automated c2 Windows and Linux Pentesting Tool used to generate reverse shell and deploy attacking scripts to host machines…☆45Updated last year