bcdannyboy / DGWRLinks
Dont Gamble with Risk
☆14Updated last year
Alternatives and similar repositories for DGWR
Users that are interested in DGWR are comparing it to the libraries listed below
Sorting:
- Leverages B64 chunks to split files and save to clipboard☆26Updated 3 months ago
- Tools for offensive security of NetBackup infrastructures☆41Updated 2 years ago
- self-hosted Azure OSINT tool☆31Updated last month
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆21Updated last year
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆52Updated 2 years ago
- ☆16Updated 6 months ago
- Nemesis agent for Mythic☆27Updated 11 months ago
- Proof-of-concept modular implant platform leveraging v8☆53Updated 5 months ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆43Updated 9 months ago
- Rapidly building a Windows 10 system to use for dynamic malware analysis (sandbox), sending data to Elastic Cloud.☆50Updated last year
- A user enumeration tool for Slack.☆30Updated last year
- Tricard - Malware Sandbox Fingerprinting☆20Updated last year
- Backend development stack for agents☆20Updated last week
- Continuous kerberoast monitor☆45Updated last year
- ☆18Updated last year
- HashKitty is a user-friendly cross-platform Python wrapper for Hashcat designed to provide an easy password cracking experience for both …☆41Updated last year
- ☆14Updated last year
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆16Updated last year
- ☆10Updated 11 months ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆59Updated 9 months ago
- details about DIAL protocol vulnerabilities☆28Updated last year
- ☆15Updated 3 years ago
- ☆17Updated 6 months ago
- Command and Control Framework using powershell implants☆35Updated last month
- ☆16Updated 3 months ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆14Updated 9 months ago
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆19Updated this week
- ☆10Updated 9 months ago
- Linux CS bypass technique☆33Updated 6 months ago
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Updated last year