adhdproject / gcat
A PoC backdoor that uses Gmail as a C&C server
☆12Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for gcat
- a port made of honey for blocking people☆11Updated 4 years ago
- Explore the GOAD Active Directory lab in 5 minutes with Adalanche☆35Updated 10 months ago
- Threat Simulator for Enterprise Networks☆14Updated 2 years ago
- Automated process to build and distribute Posture & Exposure Reports' bi-weekly to customers.☆17Updated 9 months ago
- Passive OS detection based on SYN packets without Transmitting any Data☆45Updated last year
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆67Updated last year
- OpenIOC rules to facilitate hunting for indicators of compromise☆38Updated 2 years ago
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆43Updated last month
- Lua plugin to extract data from Wireshark and convert it into MISP format☆47Updated last year
- Traps web spiders☆63Updated 4 years ago
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆125Updated last year
- Project to Support The Hunter's Framework (THF)☆11Updated 7 months ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆64Updated 5 months ago
- Convert a variety of log formats to CSV while enriching detected IPs with Geolocation, ASN, DNS, WhoIs, Shodan InternetDB and Threat Indi…☆98Updated last month
- A generic skeleton project for quickly getting a new cisagov project started.☆14Updated this week
- An experimental Velociraptor implementation using cloud infrastructure☆21Updated 2 weeks ago
- This repo contains a list of vendors that hide their security advisories, alerts, notices, vulnerabilities, and more behind either a payw…☆31Updated 6 months ago
- A MITRE ATT&CK Lookup Tool☆44Updated 6 months ago
- Threat Analytics Search Chrome Extension☆12Updated 8 months ago
- Bloodhound Portable for Windows☆51Updated last year
- A few quick recipes for those that do not have much time during the day☆21Updated 3 weeks ago
- This project can be used to create AMIs based on Kali Linux, a penetration testing distribution.☆17Updated last month
- PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.☆60Updated 7 months ago
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆31Updated 3 weeks ago
- Baseline a Windows System against LOLBAS☆25Updated 6 months ago
- Powershell Scripts to work on Crowdstrike Falcon that pull back raw data relevant to forensic investigation☆22Updated 3 months ago
- This script enhances endpoint logging telemetry for the purpose of advanced malware threat detection or for building detections or malwar…☆22Updated 2 months ago
- ☆15Updated 2 years ago
- Template for building a packet sniffer☆14Updated 7 months ago