adhdproject / gcatLinks
A PoC backdoor that uses Gmail as a C&C server
☆14Updated 4 years ago
Alternatives and similar repositories for gcat
Users that are interested in gcat are comparing it to the libraries listed below
Sorting:
- a port made of honey for blocking people☆13Updated 4 years ago
- Passive OS detection based on SYN packets without Transmitting any Data☆46Updated 2 years ago
- Traps web spiders☆73Updated 4 years ago
- Threat Simulator for Enterprise Networks☆14Updated 3 years ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆70Updated 2 years ago
- This project can be used to create AMIs based on Kali Linux, a penetration testing distribution.☆21Updated last week
- A MITRE ATT&CK Lookup Tool☆45Updated last year
- Mitre ATT&CK framework tactics and techniques in markdown format for best use in Obsidian☆17Updated 9 months ago
- New version of the buildkit repository☆9Updated 2 years ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆19Updated last year
- Virtual machines that are set up with a variety of known vulnerabilities.☆14Updated 3 years ago
- Collection of videos of Raids on Cybercriminals☆19Updated 2 months ago
- Template for building a packet sniffer☆14Updated last year
- Lua plugin to extract data from Wireshark and convert it into MISP format☆48Updated last year
- Explore the GOAD Active Directory lab in 5 minutes with Adalanche☆37Updated 4 months ago
- ☆21Updated 3 years ago
- ☆23Updated last month
- Network security visualization tool, showcasing live traffic between internal and external hosts in a real-time visualization.☆25Updated 2 years ago
- Caldera plugin to deploy "humans" to emulate user behavior on systems☆28Updated last year
- YARA, SIGMA, SNORT Rules based on Malware Analysis☆16Updated last month
- Automated process to build and distribute Posture & Exposure Reports' bi-weekly to customers.☆17Updated last year
- Orchestrate gatherer, scanner, saver, and trustymail_reporter☆18Updated this week
- Learn about a network from a pcap file or reading from an interface☆29Updated last year
- Device profile: Define acceptable amounts of traffic for your devices and see a report of outliers.☆16Updated 5 years ago
- DShield Sensor Log Collection with ELK☆28Updated 2 weeks ago
- A collection of PowerShell modules for interacting with the Shodan API. Includes modules for returning information about the API, client …☆24Updated 10 months ago
- Threat Analytics Search Chrome Extension☆12Updated last year
- ☆16Updated 3 years ago
- Bloodhound Portable for Windows☆51Updated 2 years ago
- This repo contains a list of vendors that hide their security advisories, alerts, notices, vulnerabilities, and more behind either a payw…☆32Updated last year