benstew / awesome-data-exfiltrationLinks
Curated list of awesome, open source data exfiltration tools
☆58Updated 3 years ago
Alternatives and similar repositories for awesome-data-exfiltration
Users that are interested in awesome-data-exfiltration are comparing it to the libraries listed below
Sorting:
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆114Updated 3 years ago
- This contains a list of Blue Team Tools that I use daily, and have stored here for reference.☆34Updated 7 years ago
- Repository of resources for configuring a Red Team SIEM using Elastic☆101Updated 7 years ago
- ☆64Updated 4 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆105Updated 3 years ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆95Updated 4 years ago
- Commands used in Windows penetration tests☆53Updated 3 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 7 months ago
- Repository and archive for Killing The Bear Gitbook☆83Updated last year
- Shodan Monitoring integration for TheHive.☆131Updated 7 months ago
- WordPress version identification and vulnerability finder.☆31Updated 2 years ago
- Ransomware Simulator for testing Blue Team Detections☆37Updated 3 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆25Updated 3 years ago
- Collaborative pentest tool with highly customizable tools☆74Updated 3 years ago
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆37Updated last year
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆62Updated 2 years ago
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆126Updated last year
- Reads and prints information from the website MalAPI.io☆38Updated 3 years ago
- Data exfiltration and covert communication tool☆39Updated 2 years ago
- ☆69Updated 3 years ago
- Malware vulnerability intel tool for third-party attackers☆120Updated 8 months ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆86Updated 3 years ago
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆49Updated 2 years ago
- A collection of Sigma rules organized by MITRE ATT&CK technique☆17Updated 3 years ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆42Updated 3 years ago
- ☆48Updated 7 months ago
- A CALDERA plugin☆26Updated 11 months ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆19Updated last year
- Create visualization from Shodan query☆74Updated 4 years ago
- ☆94Updated 2 years ago