adhdproject / gcatLinks
A PoC backdoor that uses Gmail as a C&C server
☆13Updated 5 years ago
Alternatives and similar repositories for gcat
Users that are interested in gcat are comparing it to the libraries listed below
Sorting:
- This project can be used to create AMIs based on Kali Linux, a penetration testing distribution.☆21Updated 3 weeks ago
- Passive OS detection based on SYN packets without Transmitting any Data☆48Updated 2 years ago
- Traps web spiders☆79Updated 5 years ago
- ☆21Updated 4 years ago
- Explore the GOAD Active Directory lab in 5 minutes with Adalanche☆42Updated last year
- ☆18Updated 4 years ago
- Example tools for detecting software using OpenSSL 3.0.0 - 3.0.6 (vulnerable to latest unnamed vulnerability)☆43Updated 3 years ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆79Updated this week
- quicmap is a simple yet quic (!) QUIC protocol scanner☆89Updated last year
- Falcon Integration Gateway (FIG)☆21Updated this week
- Network security visualization tool, showcasing live traffic between internal and external hosts in a real-time visualization.☆27Updated 2 years ago
- Mitre ATT&CK framework tactics and techniques in markdown format for best use in Obsidian☆18Updated last year
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆73Updated last year
- Threat Analytics Search Chrome Extension☆12Updated this week
- Template for building a packet sniffer☆15Updated last year
- Signature based honeypot detector tool written in Golang☆108Updated 10 months ago
- ☆61Updated this week
- DShield Sensor Log Collection with ELK☆44Updated last week
- This repository contains a script created by Truesec CSIRT team which can be used to identify signs of compromise and to some extent, mit…☆11Updated 4 years ago
- a port made of honey for blocking people☆13Updated 5 years ago
- Threat Simulator for Enterprise Networks☆14Updated 3 years ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆103Updated last year
- Nessus Cheat Sheet in HTML, PDF, PNG, ADOC☆12Updated 3 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆34Updated 3 years ago
- Device profile: Define acceptable amounts of traffic for your devices and see a report of outliers.☆16Updated 6 years ago
- ☆27Updated 6 months ago
- Repo for Automations and other solutions for Elastic SIEM/Security.☆18Updated 4 years ago
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆128Updated 2 years ago
- eMASSer is a command-line interface (CLI) that aims to automate routine business use-cases and provide utility surrounding the Enterprise…☆46Updated last month
- Short deep dive into Threat Hunting on AWS☆17Updated 2 years ago