ahhh / Cybersecurity-TradecraftView external linksLinks
A repo to support the book
☆113Aug 5, 2021Updated 4 years ago
Alternatives and similar repositories for Cybersecurity-Tradecraft
Users that are interested in Cybersecurity-Tradecraft are comparing it to the libraries listed below
Sorting:
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆23Sep 15, 2021Updated 4 years ago
- ☆18Feb 14, 2019Updated 6 years ago
- ☆199Jan 30, 2026Updated 2 weeks ago
- ☆15Feb 9, 2022Updated 4 years ago
- ☆33Aug 14, 2020Updated 5 years ago
- ☆61Aug 30, 2021Updated 4 years ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆44Oct 29, 2024Updated last year
- GoLang Scripting Expert, a repo for template scripts regarding basic golang functions, many with a security focus☆23Jun 22, 2020Updated 5 years ago
- Proper Payload Protection Prevents Poor Performance☆76Jul 27, 2022Updated 3 years ago
- Vampire is an aggressor script which integrates with BloodHound to mark nodes as owned.☆79Apr 6, 2021Updated 4 years ago
- A simple intrusion detection system that detects anomalous IP payloads, vertical and horizontal port scanning attacks in the selected net…☆10Apr 16, 2018Updated 7 years ago
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆62Jun 2, 2018Updated 7 years ago
- A recreation of the "Nobelium" malware based on Microsofts Malware analysis - Part 1: PDF2Pwn☆101Mar 8, 2023Updated 2 years ago
- It records your screenshots and code, then lets you upload to ASHIRT☆57Updated this week
- various slides and presentations I've worked on☆19Mar 21, 2025Updated 10 months ago
- A self-hosted Armory implementation.☆21Jan 1, 2026Updated last month
- Beacon Object Files for roasting Active Directory☆235Feb 21, 2022Updated 3 years ago
- Suite of tools to facilitate attacks against the Jamf macOS management platform.☆189Feb 10, 2021Updated 5 years ago
- Injects additional machine instructions into various binary formats.☆289Feb 3, 2024Updated 2 years ago
- Macro-Enabled Excel File Generator (.xlsm) using the EPPlus Library.☆148Sep 7, 2020Updated 5 years ago
- Sustainable shellcode evasion☆112Dec 11, 2024Updated last year
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆98Apr 13, 2023Updated 2 years ago
- GhostBuild is a collection of simple MSBuild launchers for various GhostPack/.NET projects☆251Sep 26, 2020Updated 5 years ago
- ☆49Feb 11, 2023Updated 3 years ago
- ☆24Oct 18, 2022Updated 3 years ago
- ☆28Dec 28, 2017Updated 8 years ago
- Cross-Platform Reverse Socks Proxy in Go☆27Feb 25, 2023Updated 2 years ago
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆297Aug 18, 2023Updated 2 years ago
- Search for potential frontable domains☆644Mar 22, 2023Updated 2 years ago
- PE File Blessing - To continue or not to continue☆87Nov 23, 2019Updated 6 years ago
- Help deobfuscate VBScript☆18Jul 1, 2022Updated 3 years ago
- A fork of https://github.com/SafeBreach-Labs/pinjectra with a practical implementation of Stack Bombing☆29Oct 22, 2020Updated 5 years ago
- simple C# portscanner - written for playing around with Metasploit's Execute-Assembly☆10Jul 1, 2023Updated 2 years ago
- A C port of b33f's UrbanBishop☆38Oct 1, 2020Updated 5 years ago
- Excel Macro Document Reader/Writer for Red Teamers & Analysts☆524Feb 1, 2022Updated 4 years ago
- SpecterOps Presentations☆211Jan 28, 2026Updated 2 weeks ago
- Ratnet is a prototype anonymity network for mesh routing and embedded scenarios.☆214May 5, 2022Updated 3 years ago
- A Red Team tool for exfiltrating sensitive data from Confluence pages.☆114Feb 21, 2023Updated 2 years ago
- EarlyBird process hollowing technique (BOF) - Spawns a process in a suspended state, inject shellcode, hijack main thread with APC, and e…☆292Mar 8, 2023Updated 2 years ago