benstew / awesome-data-exfiltration
Curated list of awesome, open source data exfiltration tools
☆57Updated 3 years ago
Alternatives and similar repositories for awesome-data-exfiltration:
Users that are interested in awesome-data-exfiltration are comparing it to the libraries listed below
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆109Updated 3 years ago
- ☆62Updated 3 years ago
- Ransomware Simulator for testing Blue Team Detections☆37Updated 2 years ago
- ☆46Updated last month
- Data exfiltration and covert communication tool☆38Updated 2 years ago
- WordPress version identification and vulnerability finder.☆28Updated 2 years ago
- Commands used in Windows penetration tests☆49Updated 3 years ago
- URL fingerprinting made easy☆82Updated 9 months ago
- BLS-Bible is a knowledge-base application that houses a collection of guides and write-ups that BLS uses for our various operations.☆26Updated last year
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆36Updated 10 months ago
- autocrack adds queue support for hashcat cracking.☆42Updated last year
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆38Updated 2 years ago
- Veil-PowerView is a powershell tool to gain network situational awareness on Windows domains.☆53Updated 9 years ago
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities☆26Updated 6 months ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆57Updated this week
- Dictionary cracking tool for HTTP Digest challenge/response hashes☆29Updated last year
- Enumerate AWS permissions and resources.☆66Updated 2 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆105Updated 2 years ago
- Curated list of public penetration test reports released by several consulting firms and academic security groups☆16Updated 3 years ago
- Locate intersting files in grayhatwarfare.com open S3 buckets and Azure blobs automatically!☆26Updated 2 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆59Updated 2 years ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆84Updated 2 years ago
- A compilation of network scanning strategies to find vulnerable devices☆73Updated 2 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- Collaborative pentest tool with highly customizable tools☆71Updated 3 years ago
- Tactics, Techniques, and Procedures☆23Updated 10 months ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆72Updated last month
- Repository of resources for configuring a Red Team SIEM using Elastic☆99Updated 6 years ago
- A MITRE ATT&CK Lookup Tool☆45Updated 8 months ago
- nse script to inject jndi payloads☆45Updated 3 years ago