advanced-threat-research / NetLlixView external linksLinks
A project created with an aim to emulate and test exfiltration of data over different network protocols.
☆31Mar 21, 2023Updated 2 years ago
Alternatives and similar repositories for NetLlix
Users that are interested in NetLlix are comparing it to the libraries listed below
Sorting:
- Enumerate AWS cloud resources based on provided credential☆51May 11, 2022Updated 3 years ago
- Norimaci is a simple and lightweight malware analysis sandbox for macOS☆70Mar 3, 2020Updated 5 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆36Jan 20, 2022Updated 4 years ago
- Modular malware analysis artifact collection and correlation framework☆54Apr 23, 2024Updated last year
- Wireless Intrusion Detection System for Hak5's WiFi Coconut☆31Apr 5, 2023Updated 2 years ago
- ☆19Dec 12, 2023Updated 2 years ago
- Reportly is an AzureAD user activity report tool.☆96Aug 14, 2023Updated 2 years ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆75Jun 27, 2023Updated 2 years ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆134Jan 31, 2022Updated 4 years ago
- ☆13Mar 1, 2024Updated last year
- ☆12Jun 22, 2022Updated 3 years ago
- An exotic service bruteforce tool.☆13Apr 12, 2025Updated 10 months ago
- ☆14May 20, 2019Updated 6 years ago
- ☆30Jul 28, 2024Updated last year
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆105May 11, 2022Updated 3 years ago
- Windows Oracle Database Attack Toolkit☆80Jul 30, 2022Updated 3 years ago
- A python port of CCob's ThreadlessInject☆25Mar 18, 2023Updated 2 years ago
- Azure AD enumeration over MS Graph☆82Nov 30, 2022Updated 3 years ago
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR☆252Oct 29, 2025Updated 3 months ago
- ☆80Apr 18, 2023Updated 2 years ago
- REST-Attacker is designed as a proof-of-concept for the feasibility of testing generic real-world REST implementations. Its goal is to pr…☆79Jan 9, 2023Updated 3 years ago
- Command and Control Framework☆13Mar 23, 2024Updated last year
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service, versions and C…☆17Feb 8, 2026Updated last week
- D3Ext's Forward Shell☆120Oct 15, 2023Updated 2 years ago
- ☆89Feb 11, 2022Updated 4 years ago
- ☆198Mar 19, 2020Updated 5 years ago
- Signing-key abuse and update exploitation framework☆132May 18, 2025Updated 8 months ago
- ReconPal: Leveraging NLP for Infosec☆57May 23, 2022Updated 3 years ago
- Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and …☆18Jun 13, 2022Updated 3 years ago
- A PowerShell script to prevent Sysmon from writing its events☆16Apr 23, 2020Updated 5 years ago
- Issues to consider when planning a red team exercise.☆14Aug 23, 2017Updated 8 years ago
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆98Jan 13, 2026Updated last month
- ☆34Apr 24, 2024Updated last year
- PowerShell SOCKS proxy with reverse proxy capabilities☆83Apr 23, 2021Updated 4 years ago
- Repository of Microsoft Driver Block Lists based off of OS-builds☆42Apr 14, 2024Updated last year
- Store and retrieve your passwords from a secure offline database. Check if your passwords has leaked previously to prevent targeted passw…☆33Mar 4, 2023Updated 2 years ago
- Fast and extensible network scanning library featuring multithreading, ping probing, and scan fetchers.☆40May 1, 2020Updated 5 years ago
- Neton is a tool for getting information from Internet connected sandboxes☆96Nov 15, 2022Updated 3 years ago
- ☆15May 26, 2021Updated 4 years ago