adhdproject / gcatLinks
A PoC backdoor that uses Gmail as a C&C server
☆14Updated 4 years ago
Alternatives and similar repositories for gcat
Users that are interested in gcat are comparing it to the libraries listed below
Sorting:
- a port made of honey for blocking people☆13Updated 5 years ago
- Explore the GOAD Active Directory lab in 5 minutes with Adalanche☆38Updated 5 months ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆70Updated 2 years ago
- This project can be used to create AMIs based on Kali Linux, a penetration testing distribution.☆21Updated this week
- Passive OS detection based on SYN packets without Transmitting any Data☆46Updated 2 years ago
- ☆16Updated 3 years ago
- Device profile: Define acceptable amounts of traffic for your devices and see a report of outliers.☆16Updated 5 years ago
- Traps web spiders☆75Updated 5 years ago
- Virtual machines that are set up with a variety of known vulnerabilities.☆15Updated 3 years ago
- New version of the buildkit repository☆9Updated 3 years ago
- ☆24Updated 2 months ago
- Mitre ATT&CK framework tactics and techniques in markdown format for best use in Obsidian☆18Updated 10 months ago
- Threat Simulator for Enterprise Networks☆14Updated 3 years ago
- Threat Analytics Search Chrome Extension☆12Updated last year
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆19Updated 2 years ago
- ☆21Updated 3 years ago
- A MITRE ATT&CK Lookup Tool☆45Updated last year
- ☆54Updated this week
- Import CrowdStrike Threat Intelligence into your instance of MISP☆47Updated 2 weeks ago
- Easily create index of your SANS books☆16Updated 2 years ago
- Powershell Scripts to work on Crowdstrike Falcon that pull back raw data relevant to forensic investigation☆22Updated 6 months ago
- Repo for Automations and other solutions for Elastic SIEM/Security.☆18Updated 4 years ago
- Lua plugin to extract data from Wireshark and convert it into MISP format☆48Updated last year
- DNS Dashboard for hunting and identifying beaconing☆16Updated 4 years ago
- Project to Support The Hunter's Framework (THF)☆11Updated last year
- ☆11Updated 4 years ago
- repository containing some nmap scripts☆14Updated 4 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 7 months ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆70Updated last year
- Bloodhound Portable for Windows☆51Updated 2 years ago