A project created with an aim to emulate and test exfiltration of data over different network protocols.
☆30Mar 21, 2023Updated 3 years ago
Alternatives and similar repositories for NetLlix
Users that are interested in NetLlix are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Enumerate AWS cloud resources based on provided credential☆52May 11, 2022Updated 3 years ago
- Modular malware analysis artifact collection and correlation framework☆56Apr 23, 2024Updated 2 years ago
- Norimaci is a simple and lightweight malware analysis sandbox for macOS☆71Mar 3, 2020Updated 6 years ago
- Windows Oracle Database Attack Toolkit☆81Jul 30, 2022Updated 3 years ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆133Jan 31, 2022Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆36Jan 20, 2022Updated 4 years ago
- ☆13Mar 1, 2024Updated 2 years ago
- An exotic service bruteforce tool.☆13Apr 12, 2025Updated last year
- Wireless Intrusion Detection System for Hak5's WiFi Coconut☆31Apr 5, 2023Updated 3 years ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆76Jun 27, 2023Updated 2 years ago
- Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and …☆17Jun 13, 2022Updated 3 years ago
- ☆198Mar 19, 2020Updated 6 years ago
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR☆256Oct 29, 2025Updated 6 months ago
- REST-Attacker is designed as a proof-of-concept for the feasibility of testing generic real-world REST implementations. Its goal is to pr…☆80Jan 9, 2023Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆19Dec 12, 2023Updated 2 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆102May 11, 2022Updated 3 years ago
- Find Microsoft Exchange instance for a given domain and identify the exact version☆190Jan 30, 2023Updated 3 years ago
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service, versions and C…☆17Mar 29, 2026Updated last month
- Reportly is an AzureAD user activity report tool.☆96Aug 14, 2023Updated 2 years ago
- ☆89Feb 11, 2022Updated 4 years ago
- A python port of CCob's ThreadlessInject☆25Mar 18, 2023Updated 3 years ago
- A PowerShell script to prevent Sysmon from writing its events☆17Apr 23, 2020Updated 6 years ago
- ICMPWatch: ICMP Packet Sniffer☆57Oct 15, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- a stage1 DLL loader with sleep obfuscation☆36Dec 27, 2022Updated 3 years ago
- ReconPal: Leveraging NLP for Infosec☆57May 23, 2022Updated 3 years ago
- Built for red teamers, by red teamers - an MCP tool for malware development, OPSEC testing, and supporting custom loader design during re…☆46Aug 10, 2025Updated 8 months ago
- Azure AD enumeration over MS Graph☆81Nov 30, 2022Updated 3 years ago
- ☆80Apr 18, 2023Updated 3 years ago
- ☆32Jun 1, 2024Updated last year
- D3Ext's Forward Shell☆120Oct 15, 2023Updated 2 years ago
- AWS Cloud Landscape Search Engine☆20Nov 29, 2023Updated 2 years ago
- Signing-key abuse and update exploitation framework☆131May 18, 2025Updated 11 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Grab NetNTLMv2 hashes using ETW with administrative rights on Windows 8.1 / Windows Server 2016 and later☆126May 9, 2023Updated 3 years ago
- Execute .Net assemblies using Rundll32.exe☆116Mar 17, 2021Updated 5 years ago
- ☆30Mar 23, 2026Updated last month
- Neton is a tool for getting information from Internet connected sandboxes☆97Nov 15, 2022Updated 3 years ago
- PyQT5 app for LOLBAS and GTFOBins☆45May 3, 2022Updated 4 years ago
- ☆36Apr 24, 2024Updated 2 years ago
- PowerShell SOCKS proxy with reverse proxy capabilities☆86Apr 23, 2021Updated 5 years ago