benstew / awesome-data-exfiltration
Curated list of awesome, open source data exfiltration tools
☆56Updated 3 years ago
Alternatives and similar repositories for awesome-data-exfiltration
Users that are interested in awesome-data-exfiltration are comparing it to the libraries listed below
Sorting:
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆114Updated 3 years ago
- Repository of resources for configuring a Red Team SIEM using Elastic☆100Updated 6 years ago
- Data exfiltration and covert communication tool☆38Updated 2 years ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆86Updated 2 years ago
- ☆69Updated 3 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Updated 2 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆106Updated 3 years ago
- nse script to inject jndi payloads☆46Updated 3 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 5 months ago
- ☆63Updated 3 years ago
- ☆28Updated 4 months ago
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆63Updated 2 years ago
- ☆42Updated last year
- This contains a list of Blue Team Tools that I use daily, and have stored here for reference.☆33Updated 7 years ago
- Ransomware Simulator for testing Blue Team Detections☆37Updated 2 years ago
- ☆79Updated 5 years ago
- A cloud-backed password cracking and assessment tool - Sponsored by Open Security☆69Updated 2 years ago
- Reads and prints information from the website MalAPI.io☆38Updated 3 years ago
- A collection of Sigma rules organized by MITRE ATT&CK technique☆17Updated 3 years ago
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆37Updated last year
- Curated list of public penetration test reports released by several consulting firms and academic security groups☆18Updated 4 years ago
- A CALDERA plugin☆26Updated 9 months ago
- Veil-PowerView is a powershell tool to gain network situational awareness on Windows domains.☆57Updated 10 years ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆68Updated last week
- ☆52Updated 6 years ago
- URL fingerprinting made easy☆86Updated last year
- an awesome list of active defense resources☆120Updated 4 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- ☆22Updated last month
- Active C2 IoCs☆99Updated 2 years ago