☆57Jan 28, 2024Updated 2 years ago
Alternatives and similar repositories for DeleFriend
Users that are interested in DeleFriend are comparing it to the libraries listed below
Sorting:
- Tricard - Malware Sandbox Fingerprinting☆23Dec 11, 2023Updated 2 years ago
- Living Under the Land on Linux ~ Bsides Belfast/Vienna 2025☆38Nov 22, 2025Updated 3 months ago
- ☆27May 6, 2024Updated last year
- Enumerate Microsoft Entra ID (Azure AD) fast☆104Jan 26, 2026Updated last month
- Burp extension to track your current IP address. Extension focused for red teams where the attacker needs to log all used IP addresses.☆25Nov 2, 2025Updated 3 months ago
- Linux CS bypass technique☆32Feb 4, 2025Updated last year
- Network Forensic Extendable Analysis Tool☆39May 22, 2022Updated 3 years ago
- Establishes mutually trusted TLS connections based on a pre-shared connection key.☆51Mar 21, 2024Updated last year
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆43Nov 28, 2025Updated 3 months ago
- All my POC related to malware development☆15Feb 19, 2026Updated last week
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Jan 14, 2021Updated 5 years ago
- Volatility 3 plugins to extract a module as complete as possible☆12Jun 13, 2023Updated 2 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- ☆16Jul 17, 2024Updated last year
- ☆14Jan 8, 2026Updated last month
- Automated (kinda) deployment of MalRDP infrastructure with Terraform & Ansible☆12Sep 15, 2023Updated 2 years ago
- Semgrep rules to identify GWT attack surface☆12Apr 28, 2022Updated 3 years ago
- Tools for playing w/ CobaltStrike config - extractin, detection, processing, etc...☆28Apr 13, 2023Updated 2 years ago
- Toolset to analyse TLS datasets☆12Aug 7, 2019Updated 6 years ago
- ☆19Jan 31, 2025Updated last year
- single-threaded event driven sleep obfuscation poc for linux☆38Jun 14, 2025Updated 8 months ago
- Tool for reconnaissance of AWS cloud environments☆16Oct 9, 2023Updated 2 years ago
- EvtPsst☆55Oct 24, 2023Updated 2 years ago
- A fork of the Go language with some tweaks☆56Jan 29, 2025Updated last year
- ☆12Apr 21, 2019Updated 6 years ago
- CVE-2024-28995 POC Vulnerability Scanner☆13Jun 15, 2024Updated last year
- Useful Windows and AD tools☆15Feb 20, 2022Updated 4 years ago
- A threat sighting collects the behavior of a real threats and the observables used during its engagement.☆12Mar 29, 2022Updated 3 years ago
- ☆18Feb 29, 2024Updated 2 years ago
- Metasploit Framework☆11Sep 5, 2017Updated 8 years ago
- Identify web application versions☆18Apr 14, 2017Updated 8 years ago
- My Jupyter Notebooks☆36Mar 14, 2025Updated 11 months ago
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆40May 7, 2023Updated 2 years ago
- A BYOSI (Bring-Your-Own-Script-Interpreter) Rapid Payload Deployment Toolkit☆118Aug 9, 2024Updated last year
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆17Jul 2, 2021Updated 4 years ago
- This project provides a set of Google Apps Scripts designed to help you identify and analyze potentially malicious domains directly from …☆14Sep 4, 2024Updated last year
- Reports and POCs for CVE 2024-43570 and CVE-2024-43535☆29Jun 7, 2025Updated 8 months ago
- Simple patcher tool to turn off TLS handshake validation in golang binaries☆12Apr 23, 2022Updated 3 years ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆19Aug 3, 2023Updated 2 years ago