adhdproject / gcatLinks
A PoC backdoor that uses Gmail as a C&C server
☆14Updated 5 years ago
Alternatives and similar repositories for gcat
Users that are interested in gcat are comparing it to the libraries listed below
Sorting:
- Traps web spiders☆75Updated 5 years ago
- This project can be used to create AMIs based on Kali Linux, a penetration testing distribution.☆21Updated last week
- Threat Simulator for Enterprise Networks☆14Updated 3 years ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆73Updated 2 years ago
- Threat Analytics Search Chrome Extension☆12Updated last year
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆70Updated last year
- Passive OS detection based on SYN packets without Transmitting any Data☆47Updated 2 years ago
- Explore the GOAD Active Directory lab in 5 minutes with Adalanche☆38Updated 7 months ago
- Mitre ATT&CK framework tactics and techniques in markdown format for best use in Obsidian☆18Updated last year
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆100Updated last year
- ☆16Updated 3 years ago
- Repo for Automations and other solutions for Elastic SIEM/Security.☆18Updated 4 years ago
- ☆57Updated this week
- eMASSer is a command-line interface (CLI) that aims to automate routine business use-cases and provide utility surrounding the Enterprise…☆42Updated last month
- Import CrowdStrike Threat Intelligence into your instance of MISP☆48Updated 2 months ago
- Template for building a packet sniffer☆14Updated last year
- Helpful tools for interacting with a GoPhish phishing instance☆49Updated last month
- Search a filesystem for indicators of compromise (IoC).☆80Updated 3 weeks ago
- Lua plugin to extract data from Wireshark and convert it into MISP format☆48Updated last year
- Network security visualization tool, showcasing live traffic between internal and external hosts in a real-time visualization.☆26Updated 2 years ago
- ☆18Updated 3 years ago
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆126Updated last year
- Extract forensic interesting information from Chrome, Firefox, Safari browsers ...☆29Updated 6 years ago
- Virtual machines that are set up with a variety of known vulnerabilities.☆15Updated 3 years ago
- A web application to streamline the development of STIGs from SRGs☆78Updated last week
- ☆21Updated 3 years ago
- Powershell Scripts to work on Crowdstrike Falcon that pull back raw data relevant to forensic investigation☆23Updated 8 months ago
- This repository contains a script created by Truesec CSIRT team which can be used to identify signs of compromise and to some extent, mit…☆11Updated 4 years ago
- A collection of awesome tools, software, libraries, learning tutorials & videos, frameworks, best practices and technical resources abou…☆56Updated 2 years ago
- CrowdStrike's Open Source Policy & Contribution Guide☆44Updated 4 months ago