A repo to support the book
☆111Aug 5, 2021Updated 4 years ago
Alternatives and similar repositories for Cybersecurity-Tradecraft
Users that are interested in Cybersecurity-Tradecraft are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆23Sep 15, 2021Updated 4 years ago
- ☆61Aug 30, 2021Updated 4 years ago
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆61Jun 2, 2018Updated 7 years ago
- ☆18Feb 14, 2019Updated 7 years ago
- ☆202Feb 27, 2026Updated 2 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Help deobfuscate VBScript☆18Jul 1, 2022Updated 3 years ago
- various slides and presentations I've worked on☆19Mar 21, 2025Updated last year
- self-hosted Azure OSINT tool☆35Jun 24, 2025Updated 10 months ago
- ☆15Feb 9, 2022Updated 4 years ago
- ☆33Aug 14, 2020Updated 5 years ago
- Macro-Enabled Excel File Generator (.xlsm) using the EPPlus Library.☆148Sep 7, 2020Updated 5 years ago
- JXA script to allow programmatic persistence via macOS Calendar.app alerts.☆44Oct 31, 2020Updated 5 years ago
- A recreation of the "Nobelium" malware based on Microsofts Malware analysis - Part 1: PDF2Pwn☆101Mar 8, 2023Updated 3 years ago
- ☆48Feb 11, 2023Updated 3 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆41Oct 29, 2024Updated last year
- ☆61Apr 20, 2026Updated 2 weeks ago
- PE File Blessing - To continue or not to continue☆87Nov 23, 2019Updated 6 years ago
- It records your screenshots and code, then lets you upload to ASHIRT☆57Updated this week
- all random stuff that dont warrant a seperate repo☆12Sep 2, 2022Updated 3 years ago
- pwntools for go!☆12Jul 14, 2019Updated 6 years ago
- A self-hosted Armory implementation.☆24Jan 1, 2026Updated 4 months ago
- Vampire is an aggressor script which integrates with BloodHound to mark nodes as owned.☆79Apr 6, 2021Updated 5 years ago
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆298Aug 18, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆97Apr 13, 2023Updated 3 years ago
- A tool to create COM class/interface relationships in neo4j☆50Oct 12, 2022Updated 3 years ago
- GoLang Scripting Expert, a repo for template scripts regarding basic golang functions, many with a security focus☆22Jun 22, 2020Updated 5 years ago
- Swift code to run a dylib on disk☆16May 9, 2022Updated 3 years ago
- Injects additional machine instructions into various binary formats.☆289Feb 3, 2024Updated 2 years ago
- Beacon Object Files for roasting Active Directory☆238Feb 21, 2022Updated 4 years ago
- A C port of b33f's UrbanBishop☆38Oct 1, 2020Updated 5 years ago
- Learn how to get more out of publicly available threat reports to help improve the security posture of your organization! TLP: White Thre…☆15Jun 5, 2023Updated 2 years ago
- Proof of concept - Covert Channel using Windows Filtering Platform (C#)☆21Aug 29, 2021Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A fork of https://github.com/SafeBreach-Labs/pinjectra with a practical implementation of Stack Bombing☆28Oct 22, 2020Updated 5 years ago
- Proper Payload Protection Prevents Poor Performance☆76Jul 27, 2022Updated 3 years ago
- Inject Encrypted Commands Into EMF Shapes for C2 In VBA / Office Malware☆39Jul 10, 2020Updated 5 years ago
- simple C# portscanner - written for playing around with Metasploit's Execute-Assembly☆10Jul 1, 2023Updated 2 years ago
- A not so awesome list of adversary emulation gems for aspiring red/blue/purple teamers☆16Jul 19, 2022Updated 3 years ago
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆14Nov 13, 2022Updated 3 years ago
- Excel Macro Document Reader/Writer for Red Teamers & Analysts☆524Apr 23, 2026Updated 2 weeks ago