adhdproject / gcat
A PoC backdoor that uses Gmail as a C&C server
☆13Updated 4 years ago
Alternatives and similar repositories for gcat:
Users that are interested in gcat are comparing it to the libraries listed below
- Passive OS detection based on SYN packets without Transmitting any Data☆46Updated last year
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆70Updated last year
- a port made of honey for blocking people☆12Updated 4 years ago
- Device profile: Define acceptable amounts of traffic for your devices and see a report of outliers.☆16Updated 5 years ago
- New version of the buildkit repository☆9Updated 2 years ago
- Template for building a packet sniffer☆14Updated last year
- Learn about a network from a pcap file or reading from an interface☆28Updated 11 months ago
- Mitre ATT&CK framework tactics and techniques in markdown format for best use in Obsidian☆17Updated 7 months ago
- Signature based honeypot detector tool written in Golang☆89Updated this week
- Lua plugin to extract data from Wireshark and convert it into MISP format☆47Updated last year
- Traps web spiders☆69Updated 4 years ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆63Updated 2 years ago
- Explore the GOAD Active Directory lab in 5 minutes with Adalanche☆36Updated 2 months ago
- Import CrowdStrike Threat Intelligence into your instance of MISP☆44Updated 2 weeks ago
- Threat Simulator for Enterprise Networks☆14Updated 2 years ago
- Virtual machines that are set up with a variety of known vulnerabilities.☆14Updated 3 years ago
- ☆52Updated this week
- ☆19Updated 3 years ago
- ☆21Updated 3 years ago
- ☆16Updated 3 years ago
- Threat Analytics Search Chrome Extension☆12Updated last year
- Search a filesystem for indicators of compromise (IoC).☆70Updated last month
- Open-source Fabric templates for cybersecurity and compliance☆16Updated 2 months ago
- This project can be used to create AMIs based on Kali Linux, a penetration testing distribution.☆19Updated this week
- Collection of useful Canary tools☆77Updated this week
- Network security visualization tool, showcasing live traffic between internal and external hosts in a real-time visualization.☆25Updated last year
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆126Updated last year
- This script enhances endpoint logging telemetry for the purpose of advanced malware threat detection or for building detections or malwar…☆27Updated last month
- Corelight@Home script☆40Updated last year
- ☆45Updated 2 years ago