This project fully automates the process of analyzing and exploiting IoT malware to find live CnC servers.
☆43Jul 23, 2024Updated last year
Alternatives and similar repositories for CnCHunter
Users that are interested in CnCHunter are comparing it to the libraries listed below
Sorting:
- Identify QuasarRAT/AsyncRAT/DcRAT/VenomRAT servers through scanning☆13Apr 20, 2024Updated last year
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆17May 7, 2021Updated 4 years ago
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service, versions and C…☆17Feb 20, 2026Updated 2 weeks ago
- IP画像业务安全版私有化部署SDK☆13Dec 8, 2022Updated 3 years ago
- Tool for fuzzing HTTP and HTTPS requests to endpoints, and identify the rules and triggers of censorship devices.☆16Feb 4, 2024Updated 2 years ago
- Python tools for targeted pcap analysis.☆13Sep 9, 2015Updated 10 years ago
- 模拟cobalt strike beacon上线包. Simulation cobalt strike beacon connection packet.☆17Sep 9, 2021Updated 4 years ago
- inject shellcode into remote process via message hook☆15Oct 28, 2020Updated 5 years ago
- 分析cobaltstrike c2 协议☆68Feb 24, 2020Updated 6 years ago
- Swift code to programmatically execute local or hosted JXA payloads from Terminal without using the on-disk osascript binary.☆23Apr 22, 2021Updated 4 years ago
- Maltego transforms to pivot between PE files based on their VirusTotal codeblocks☆19Jul 15, 2021Updated 4 years ago
- Self defense post module for metasploit☆17Aug 30, 2019Updated 6 years ago
- Binary Ninja plugin that syncs WinDbg to Binary Ninja☆47Apr 13, 2018Updated 7 years ago
- Mobile Helper Framework (mhf) is a tool that automates the process of identifying the framework/technology used to create a mobile applic…☆26Dec 23, 2025Updated 2 months ago
- ☆21Dec 22, 2020Updated 5 years ago
- This repository contains dynamic and static tools for IoT malware analysis☆21Jul 4, 2022Updated 3 years ago
- nmap -> searchploit -> GoBuster/Eyewitness & LDAPsearch & SMBclient & Showmount☆21Apr 26, 2020Updated 5 years ago
- Some of the presentations given by me☆19Aug 8, 2025Updated 7 months ago
- The report of a supervised classifier to detect malware in TLS traffic☆20Oct 21, 2019Updated 6 years ago
- Utility to inject honey tokens into lsass.☆28Feb 7, 2017Updated 9 years ago
- 天御攻防实验室 - 威胁猎杀实战系列☆102Jul 4, 2019Updated 6 years ago
- 修改nmap的特征流量,过 emergingthreats 的公开ids规则。☆21Aug 14, 2019Updated 6 years ago
- no-defender re-up all credit goes to https://github.com/es3n1n/no-defender☆28Jun 10, 2024Updated last year
- Explore Indicators of Compromise Automatically☆96Feb 27, 2020Updated 6 years ago
- This repository introduces the NICT Darknet Dataset 2022 https://csdataset.nict.go.jp/darknet-2022/☆11Sep 29, 2023Updated 2 years ago
- 基于inotify的Linux文件实时监控程序,同时调用河马扫描来检测文件☆22Sep 4, 2020Updated 5 years ago
- A repository of open source reports on different malware families used in targeted cyber intrusions ("APT").☆55Jun 27, 2015Updated 10 years ago
- 沙箱测试,测评国内常见沙箱的代码与结论☆107Jul 3, 2021Updated 4 years ago
- goscanner is a tool for large-scale TLS and SSH scans☆33Jan 7, 2026Updated 2 months ago
- PackGenome: Automatically Generating Robust YARA Rules for Accurate Malware Packer Detection☆28Dec 6, 2023Updated 2 years ago
- ☆35Jan 13, 2026Updated last month
- SPPNet: An Appoach For Real-Time Encrypted Traffic Classification Using Deep Learning☆10Aug 6, 2024Updated last year
- A repository for a Deep Q-Learning approach to intrusion detection for networks cyber-attacks.☆10Sep 3, 2021Updated 4 years ago
- 安卓远控,天线6.0 无限使用版☆11Sep 9, 2023Updated 2 years ago
- Find IP address and Geolocation of target whatsapp user☆11Nov 23, 2023Updated 2 years ago
- A protocol reverse engineer tool written in java.☆30Oct 14, 2016Updated 9 years ago
- Detect burp☆33Jun 7, 2021Updated 4 years ago
- ☆35Nov 11, 2025Updated 3 months ago
- ☆38Jul 14, 2020Updated 5 years ago