benstew / awesome-data-exfiltration
Curated list of awesome, open source data exfiltration tools
☆58Updated 3 years ago
Alternatives and similar repositories for awesome-data-exfiltration:
Users that are interested in awesome-data-exfiltration are comparing it to the libraries listed below
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆110Updated 3 years ago
- Ransomware Simulator for testing Blue Team Detections☆37Updated 2 years ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆95Updated 3 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆104Updated 2 years ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆59Updated this week
- ☆63Updated 3 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆73Updated 3 months ago
- autocrack adds queue support for hashcat cracking.☆42Updated last year
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 3 years ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆85Updated 2 years ago
- Data exfiltration and covert communication tool☆38Updated 2 years ago
- ☆51Updated 6 years ago
- Reference sheet for Threat Hunting Professional Course☆25Updated 5 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- Malware vulnerability intel tool for third-party attackers☆114Updated 3 months ago
- URL fingerprinting made easy☆85Updated 10 months ago
- ☆69Updated 3 years ago
- Repository of resources for configuring a Red Team SIEM using Elastic☆100Updated 6 years ago
- This script is a multi-threaded Okta password sprayer.☆70Updated last year
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆37Updated 11 months ago
- The Atomic Playbook contains TTPs from the MITRE ATT&CK framework mapped to the tests in the Atomic Red Team. It serves as a single resou…☆32Updated last year
- This contains a list of Blue Team Tools that I use daily, and have stored here for reference.☆33Updated 7 years ago
- Next Generation Phishing Tool For Internal / Red Teams☆35Updated 5 years ago
- ☆26Updated 3 years ago
- Simple parser to get useful information from AWS S3 logs☆24Updated 3 years ago
- ☆77Updated 5 years ago
- Reads and prints information from the website MalAPI.io☆38Updated 3 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆59Updated 2 years ago
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆62Updated 10 months ago
- ☆79Updated last year