adhdproject / gcat
A PoC backdoor that uses Gmail as a C&C server
☆12Updated 4 years ago
Alternatives and similar repositories for gcat:
Users that are interested in gcat are comparing it to the libraries listed below
- a port made of honey for blocking people☆11Updated 4 years ago
- Passive OS detection based on SYN packets without Transmitting any Data☆45Updated last year
- A Wordpress Honeypot☆9Updated 3 years ago
- This project can be used to create AMIs based on Kali Linux, a penetration testing distribution.☆18Updated this week
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆68Updated last year
- Explore the GOAD Active Directory lab in 5 minutes with Adalanche☆36Updated last week
- Security Monitoring using Wazuh, published by Packt☆14Updated 9 months ago
- Lua plugin to extract data from Wireshark and convert it into MISP format☆47Updated last year
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆47Updated 2 weeks ago
- Project to Support The Hunter's Framework (THF)☆11Updated 9 months ago
- ☆13Updated last year
- Caldera plugin to deploy "humans" to emulate user behavior on systems☆27Updated 8 months ago
- Traps web spiders☆64Updated 4 years ago
- Threat Simulator for Enterprise Networks☆14Updated 2 years ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆18Updated last year
- ETM enables the creation of detailed attack graphs and figures while calculating the risk associated with your attack narratives. ETM was…☆25Updated last year
- Automated process to build and distribute Posture & Exposure Reports' bi-weekly to customers.☆17Updated 11 months ago
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆32Updated last month
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆64Updated 6 months ago
- Import CrowdStrike Threat Intelligence into your instance of MISP☆42Updated 2 months ago
- Template for building a packet sniffer☆14Updated 9 months ago
- Collection of useful Canary tools☆75Updated last month
- Bloodhound Portable for Windows☆51Updated last year
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Updated 4 years ago
- Search a filesystem for indicators of compromise (IoC).☆69Updated 4 months ago
- Repo for Automations and other solutions for Elastic SIEM/Security.☆18Updated 3 years ago
- Signature based honeypot detector tool written in Golang☆85Updated last month
- Kali Linux extra useful packages for CTF and Pentest activities☆10Updated last month
- ☆21Updated 3 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago