adhdproject / gcatLinks
A PoC backdoor that uses Gmail as a C&C server
☆14Updated 5 years ago
Alternatives and similar repositories for gcat
Users that are interested in gcat are comparing it to the libraries listed below
Sorting:
- This project can be used to create AMIs based on Kali Linux, a penetration testing distribution.☆21Updated 3 weeks ago
- Explore the GOAD Active Directory lab in 5 minutes with Adalanche☆40Updated 9 months ago
- Device profile: Define acceptable amounts of traffic for your devices and see a report of outliers.☆16Updated 5 years ago
- Passive OS detection based on SYN packets without Transmitting any Data☆47Updated 2 years ago
- Threat Simulator for Enterprise Networks☆14Updated 3 years ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆78Updated 2 weeks ago
- a port made of honey for blocking people☆13Updated 5 years ago
- Threat Analytics Search Chrome Extension☆12Updated last year
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆72Updated last year
- Traps web spiders☆76Updated 5 years ago
- THOR APT Scanner User Manual☆20Updated this week
- Mitre ATT&CK framework tactics and techniques in markdown format for best use in Obsidian☆18Updated last year
- Falcon Integration Gateway (FIG)☆21Updated 2 weeks ago
- Easily create index of your SANS books☆18Updated 3 years ago
- Repo for Automations and other solutions for Elastic SIEM/Security.☆18Updated 4 years ago
- quicmap is a simple yet quic (!) QUIC protocol scanner☆89Updated last year
- Import CrowdStrike Threat Intelligence into your instance of MISP☆48Updated 4 months ago
- ☆25Updated 3 weeks ago
- DShield Sensor Log Collection with ELK☆42Updated last month
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆23Updated 4 years ago
- repository containing some nmap scripts☆16Updated 4 years ago
- Example tools for detecting software using OpenSSL 3.0.0 - 3.0.6 (vulnerable to latest unnamed vulnerability)☆43Updated 3 years ago
- Short deep dive into Threat Hunting on AWS☆14Updated 2 years ago
- Network security visualization tool, showcasing live traffic between internal and external hosts in a real-time visualization.☆27Updated 2 years ago
- ☆19Updated 3 years ago
- Lua plugin to extract data from Wireshark and convert it into MISP format☆49Updated 2 years ago
- This repo contains a list of vendors that hide their security advisories, alerts, notices, vulnerabilities, and more behind either a payw…☆32Updated last year
- Virtual machines that are set up with a variety of known vulnerabilities.☆15Updated 3 years ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆65Updated 3 years ago
- ☆18Updated 3 months ago