adhdproject / gcat
A PoC backdoor that uses Gmail as a C&C server
☆13Updated 4 years ago
Alternatives and similar repositories for gcat:
Users that are interested in gcat are comparing it to the libraries listed below
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆68Updated last year
- a port made of honey for blocking people☆11Updated 4 years ago
- Passive OS detection based on SYN packets without Transmitting any Data☆45Updated last year
- This project can be used to create AMIs based on Kali Linux, a penetration testing distribution.☆19Updated this week
- Explore the GOAD Active Directory lab in 5 minutes with Adalanche☆36Updated last month
- Device profile: Define acceptable amounts of traffic for your devices and see a report of outliers.☆16Updated 5 years ago
- Project to Support The Hunter's Framework (THF)☆11Updated 10 months ago
- Threat Simulator for Enterprise Networks☆14Updated 2 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆18Updated last year
- A few quick recipes for those that do not have much time during the day☆22Updated 3 months ago
- DNS Dashboard for hunting and identifying beaconing☆14Updated 4 years ago
- Powershell Scripts to work on Crowdstrike Falcon that pull back raw data relevant to forensic investigation☆22Updated 2 months ago
- ☆16Updated 3 years ago
- Falcon Integration Gateway (FIG)☆18Updated 3 weeks ago
- This project is an Ansible Role to execute Atomic Red Team tests against multiple machines by wrapping Invoke-AtomicRedTeam☆25Updated 7 months ago
- Threat Analytics Search Chrome Extension☆12Updated 11 months ago
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆127Updated last year
- Sharing Threat Hunting runbooks☆25Updated 5 years ago
- Distribution of the SANS SEC504 Windows Cheat Sheet Lab☆68Updated 4 years ago
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆53Updated last month
- Baseline a Windows System against LOLBAS☆25Updated 9 months ago
- DEFCON 31 slide deck and video link☆58Updated 7 months ago
- Caldera plugin to deploy "humans" to emulate user behavior on systems☆27Updated 9 months ago
- Virtual machines that are set up with a variety of known vulnerabilities.☆13Updated 2 years ago
- ☆21Updated 3 years ago
- Mitre ATT&CK framework tactics and techniques in markdown format for best use in Obsidian☆16Updated 6 months ago
- PowerShell 'Hero': scripts for DFIR and automation with a PowerShell menu example.☆36Updated last year
- This repo contains a list of vendors that hide their security advisories, alerts, notices, vulnerabilities, and more behind either a payw…☆31Updated 9 months ago