adhdproject / gcat
A PoC backdoor that uses Gmail as a C&C server
☆12Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for gcat
- a port made of honey for blocking people☆11Updated 4 years ago
- Passive OS detection based on SYN packets without Transmitting any Data☆45Updated last year
- Project to Support The Hunter's Framework (THF)☆11Updated 6 months ago
- Explore the GOAD Active Directory lab in 5 minutes with Adalanche☆34Updated 10 months ago
- Mitre ATT&CK framework tactics and techniques in markdown format for best use in Obsidian☆16Updated 3 months ago
- OpenIOC rules to facilitate hunting for indicators of compromise☆38Updated 2 years ago
- This project can be used to create AMIs based on Kali Linux, a penetration testing distribution.☆16Updated 2 weeks ago
- A generic skeleton project for quickly getting a new cisagov project started.☆14Updated this week
- ☆14Updated 3 years ago
- Stupid Simple Detection Testing☆11Updated 8 months ago
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆31Updated 2 weeks ago
- Hackers Don't Give A Shit☆15Updated 4 years ago
- Lua plugin to extract data from Wireshark and convert it into MISP format☆47Updated last year
- ☆21Updated 3 years ago
- DEFCON 31 slide deck and video link☆58Updated 4 months ago
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆42Updated 2 weeks ago
- Device profile: Define acceptable amounts of traffic for your devices and see a report of outliers.☆16Updated 4 years ago
- A few quick recipes for those that do not have much time during the day☆21Updated last week
- Use SQL to instantly query file, domain, URL and IP scanning results from VirusTotal.☆22Updated last week
- A tool that allows you to document and assess any security automation in your SOC☆41Updated last week
- Threat Simulator for Enterprise Networks☆14Updated 2 years ago
- DNS Dashboard for hunting and identifying beaconing☆14Updated 4 years ago
- This script provides a Python library with methods to authenticate to various sources of threat intelligence and query IPs for the latest…☆18Updated 2 years ago
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆36Updated 7 months ago
- Automated process to build and distribute Posture & Exposure Reports' bi-weekly to customers.☆17Updated 8 months ago
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆125Updated last year
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆62Updated 4 months ago
- Template for building a packet sniffer☆14Updated 7 months ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆17Updated last year