adava / CnCHunterView external linksLinks
This project fully automates the process of analyzing and exploiting IoT malware to find live CnC servers.
☆43Jul 23, 2024Updated last year
Alternatives and similar repositories for CnCHunter
Users that are interested in CnCHunter are comparing it to the libraries listed below
Sorting:
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆17May 7, 2021Updated 4 years ago
- IP画像业务安全版私有化部署SDK☆13Dec 8, 2022Updated 3 years ago
- Extracting AsyncRAT configuration using CyberChef☆14May 4, 2022Updated 3 years ago
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service, versions and C…☆17Updated this week
- inject shellcode into remote process via message hook☆15Oct 28, 2020Updated 5 years ago
- 模拟cobalt strike beacon上线包. Simulation cobalt strike beacon connection packet.☆17Sep 9, 2021Updated 4 years ago
- Python tools for targeted pcap analysis.☆13Sep 9, 2015Updated 10 years ago
- 分析cobaltstrike c2 协议☆68Feb 24, 2020Updated 5 years ago
- Self defense post module for metasploit☆17Aug 30, 2019Updated 6 years ago
- Swift code to programmatically execute local or hosted JXA payloads from Terminal without using the on-disk osascript binary.☆23Apr 22, 2021Updated 4 years ago
- Maltego transforms to pivot between PE files based on their VirusTotal codeblocks☆19Jul 15, 2021Updated 4 years ago
- Binary Ninja plugin that syncs WinDbg to Binary Ninja☆47Apr 13, 2018Updated 7 years ago
- This repository contains dynamic and static tools for IoT malware analysis☆21Jul 4, 2022Updated 3 years ago
- Some of the presentations given by me☆19Aug 8, 2025Updated 6 months ago
- nmap -> searchploit -> GoBuster/Eyewitness & LDAPsearch & SMBclient & Showmount☆21Apr 26, 2020Updated 5 years ago
- ☆19Aug 1, 2019Updated 6 years ago
- The report of a supervised classifier to detect malware in TLS traffic☆21Oct 21, 2019Updated 6 years ago
- Utility to inject honey tokens into lsass.☆28Feb 7, 2017Updated 9 years ago
- Domain Borrowing PoC☆218May 6, 2021Updated 4 years ago
- 修改nmap的特征流量,过 emergingthreats 的公开ids规则。☆21Aug 14, 2019Updated 6 years ago
- Scripts for CCS 2015 "Seeing through Network Protocol Obfuscation"☆24Mar 16, 2016Updated 9 years ago
- This repository introduces the NICT Darknet Dataset 2022 https://csdataset.nict.go.jp/darknet-2022/☆11Sep 29, 2023Updated 2 years ago
- 基于inotify的Linux文件实时监控程序,同时调用河马扫描来检测文件☆22Sep 4, 2020Updated 5 years ago
- A tool to assist with network-based hunting for GRU's Drovorub malware c2☆25Aug 28, 2020Updated 5 years ago
- A repository of open source reports on different malware families used in targeted cyber intrusions ("APT").☆55Jun 27, 2015Updated 10 years ago
- PackGenome: Automatically Generating Robust YARA Rules for Accurate Malware Packer Detection☆28Dec 6, 2023Updated 2 years ago
- goscanner is a tool for large-scale TLS and SSH scans☆33Jan 7, 2026Updated last month
- A repository for a Deep Q-Learning approach to intrusion detection for networks cyber-attacks.☆10Sep 3, 2021Updated 4 years ago
- 安卓远控,天线6.0 无限使用版☆11Sep 9, 2023Updated 2 years ago
- Find IP address and Geolocation of target whatsapp user☆11Nov 23, 2023Updated 2 years ago
- A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object☆168Oct 14, 2022Updated 3 years ago
- Supershell反制☆32Aug 8, 2023Updated 2 years ago
- SysTracer: Linux 系统活动跟踪器☆34Dec 14, 2022Updated 3 years ago
- A protocol reverse engineer tool written in java.☆30Oct 14, 2016Updated 9 years ago
- ☆38Jul 14, 2020Updated 5 years ago
- Detect burp☆33Jun 7, 2021Updated 4 years ago
- VBScript & VBA source-to-source deobfuscator with partial-evaluation☆80Aug 7, 2024Updated last year
- ☆74Jul 23, 2021Updated 4 years ago
- 父进程欺骗,另类administrator提权到system☆35Feb 18, 2022Updated 3 years ago