A project created with an aim to emulate and test exfiltration of data over different network protocols.
☆31Mar 21, 2023Updated 3 years ago
Alternatives and similar repositories for NetLlix
Users that are interested in NetLlix are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Enumerate AWS cloud resources based on provided credential☆52May 11, 2022Updated 3 years ago
- Modular malware analysis artifact collection and correlation framework☆54Apr 23, 2024Updated last year
- Norimaci is a simple and lightweight malware analysis sandbox for macOS☆71Mar 3, 2020Updated 6 years ago
- Windows Oracle Database Attack Toolkit☆80Jul 30, 2022Updated 3 years ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆133Jan 31, 2022Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆36Jan 20, 2022Updated 4 years ago
- ☆13Mar 1, 2024Updated 2 years ago
- An exotic service bruteforce tool.☆13Apr 12, 2025Updated 11 months ago
- Wireless Intrusion Detection System for Hak5's WiFi Coconut☆31Apr 5, 2023Updated 2 years ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆75Jun 27, 2023Updated 2 years ago
- Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and …☆18Jun 13, 2022Updated 3 years ago
- ☆197Mar 19, 2020Updated 6 years ago
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR☆254Oct 29, 2025Updated 5 months ago
- REST-Attacker is designed as a proof-of-concept for the feasibility of testing generic real-world REST implementations. Its goal is to pr…☆79Jan 9, 2023Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆19Dec 12, 2023Updated 2 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆102May 11, 2022Updated 3 years ago
- Find Microsoft Exchange instance for a given domain and identify the exact version☆189Jan 30, 2023Updated 3 years ago
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service, versions and C…☆17Feb 20, 2026Updated last month
- Reportly is an AzureAD user activity report tool.☆96Aug 14, 2023Updated 2 years ago
- ☆89Feb 11, 2022Updated 4 years ago
- A python port of CCob's ThreadlessInject☆25Mar 18, 2023Updated 3 years ago
- A PowerShell script to prevent Sysmon from writing its events☆17Apr 23, 2020Updated 5 years ago
- ICMPWatch: ICMP Packet Sniffer☆57Oct 15, 2024Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- a stage1 DLL loader with sleep obfuscation☆36Dec 27, 2022Updated 3 years ago
- ReconPal: Leveraging NLP for Infosec☆57May 23, 2022Updated 3 years ago
- Azure AD enumeration over MS Graph☆81Nov 30, 2022Updated 3 years ago
- Built for red teamers, by red teamers - an MCP tool for malware development, OPSEC testing, and supporting custom loader design during re…☆43Aug 10, 2025Updated 7 months ago
- ☆80Apr 18, 2023Updated 2 years ago
- ☆32Jun 1, 2024Updated last year
- D3Ext's Forward Shell☆120Oct 15, 2023Updated 2 years ago
- AWS Cloud Landscape Search Engine☆20Nov 29, 2023Updated 2 years ago
- Signing-key abuse and update exploitation framework☆131May 18, 2025Updated 10 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Grab NetNTLMv2 hashes using ETW with administrative rights on Windows 8.1 / Windows Server 2016 and later☆119May 9, 2023Updated 2 years ago
- Execute .Net assemblies using Rundll32.exe☆115Mar 17, 2021Updated 5 years ago
- ☆30Jul 28, 2024Updated last year
- Neton is a tool for getting information from Internet connected sandboxes☆98Nov 15, 2022Updated 3 years ago
- PyQT5 app for LOLBAS and GTFOBins☆45May 3, 2022Updated 3 years ago
- ☆36Apr 24, 2024Updated last year
- PowerShell SOCKS proxy with reverse proxy capabilities☆85Apr 23, 2021Updated 4 years ago