benstew / awesome-data-exfiltrationLinks
Curated list of awesome, open source data exfiltration tools
☆62Updated 4 years ago
Alternatives and similar repositories for awesome-data-exfiltration
Users that are interested in awesome-data-exfiltration are comparing it to the libraries listed below
Sorting:
- This contains a list of Blue Team Tools that I use daily, and have stored here for reference.☆35Updated 7 years ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆115Updated 4 years ago
- ☆65Updated 4 years ago
- Repository of resources for configuring a Red Team SIEM using Elastic☆101Updated 7 years ago
- WordPress version identification and vulnerability finder.☆31Updated 3 years ago
- Commands used in Windows penetration tests☆54Updated last week
- ☆24Updated 4 months ago
- Repository and archive for Killing The Bear Gitbook☆83Updated 2 years ago
- Shodan Monitoring integration for TheHive.☆131Updated 10 months ago
- Your go-to resource for all things OSINT☆181Updated last year
- BlueBox Malware analysis Box and Cyber threat intelligence.☆43Updated 3 years ago
- ☆48Updated last month
- Data exfiltration and covert communication tool☆39Updated 2 years ago
- List of Repositories☆100Updated 4 years ago
- Publicly availalbe vulnarble by desgin vm/machines☆43Updated 3 years ago
- ☆94Updated 3 years ago
- Reads and prints information from the website MalAPI.io☆39Updated 3 years ago
- Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translatin…☆126Updated 6 months ago
- URL fingerprinting made easy☆89Updated last year
- Ransomware Simulator for testing Blue Team Detections☆39Updated 3 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆106Updated 3 years ago
- Tracking my journey towards earning my OSCP. This includes the process of everything that I learn along the way.☆47Updated 3 years ago
- Dictionary cracking tool for HTTP Digest challenge/response hashes☆32Updated 2 years ago
- ☆36Updated 5 years ago
- Curated list of public penetration test reports released by several consulting firms and academic security groups☆19Updated 4 years ago
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆63Updated 3 years ago
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆125Updated last year
- Open Threat Hunting Framework☆121Updated 2 years ago
- Robo-Red-Team: Training platform for blue team cybersecurity professionals☆51Updated 4 years ago
- A MITRE ATT&CK Lookup Tool☆45Updated last year