benstew / awesome-data-exfiltration
Curated list of awesome, open source data exfiltration tools
☆56Updated 3 years ago
Alternatives and similar repositories for awesome-data-exfiltration:
Users that are interested in awesome-data-exfiltration are comparing it to the libraries listed below
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆113Updated 3 years ago
- Repository of resources for configuring a Red Team SIEM using Elastic☆100Updated 6 years ago
- ☆63Updated 3 years ago
- Ransomware Simulator for testing Blue Team Detections☆37Updated 2 years ago
- autocrack adds queue support for hashcat cracking.☆41Updated 2 years ago
- Data exfiltration and covert communication tool☆38Updated 2 years ago
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆37Updated last year
- A collection of Sigma rules organized by MITRE ATT&CK technique☆17Updated 3 years ago
- BLS-Bible is a knowledge-base application that houses a collection of guides and write-ups that BLS uses for our various operations.☆27Updated last year
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- ☆52Updated 6 years ago
- Next Generation Phishing Tool For Internal / Red Teams☆35Updated 5 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆106Updated 2 years ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆101Updated last year
- Bloodhound Portable for Windows☆51Updated last year
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆85Updated 2 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆72Updated 3 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆59Updated 2 years ago
- A MITRE ATT&CK Lookup Tool☆45Updated 11 months ago
- WordPress version identification and vulnerability finder.☆30Updated 2 years ago
- Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team].☆149Updated 2 years ago
- Simple parser to get useful information from AWS S3 logs☆25Updated 3 years ago
- A CALDERA plugin☆26Updated 8 months ago
- BSidesRoc 2022 Linux Malware/Forensics Course☆75Updated 3 years ago
- A home for detection content developed by the delivr.to team☆67Updated last month
- ☆24Updated 2 years ago
- Curated list of public penetration test reports released by several consulting firms and academic security groups☆18Updated 4 years ago
- ☆46Updated 3 months ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆73Updated 4 months ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆67Updated last week