benstew / awesome-data-exfiltrationLinks
Curated list of awesome, open source data exfiltration tools
☆62Updated 3 years ago
Alternatives and similar repositories for awesome-data-exfiltration
Users that are interested in awesome-data-exfiltration are comparing it to the libraries listed below
Sorting:
- ☆64Updated 4 years ago
- Repository of resources for configuring a Red Team SIEM using Elastic☆101Updated 7 years ago
- This contains a list of Blue Team Tools that I use daily, and have stored here for reference.☆35Updated 7 years ago
- WordPress version identification and vulnerability finder.☆31Updated 3 years ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆114Updated 3 years ago
- Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translatin…☆126Updated 6 months ago
- ☆94Updated 2 years ago
- Reads and prints information from the website MalAPI.io☆39Updated 3 years ago
- ☆48Updated 2 weeks ago
- Commands used in Windows penetration tests☆54Updated 3 years ago
- Curated list of public penetration test reports released by several consulting firms and academic security groups☆19Updated 4 years ago
- Repo containing my personal walkthroughs of PMAT Labs i.e. PMAT Malware Samples.☆43Updated 3 years ago
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆63Updated 2 years ago
- Shodan Monitoring integration for TheHive.☆131Updated 10 months ago
- ☆24Updated 3 months ago
- Tracking my journey towards earning my OSCP. This includes the process of everything that I learn along the way.☆47Updated 3 years ago
- Slides and materials for conference presentations☆11Updated 2 years ago
- Dictionary cracking tool for HTTP Digest challenge/response hashes☆32Updated 2 years ago
- Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Cont…☆49Updated last year
- BSidesRoc 2022 Linux Malware/Forensics Course☆77Updated 3 years ago
- List of Repositories☆100Updated 3 years ago
- A Python package is used to execute Atomic Red Team tests (Atomics) across multiple operating system environments.☆135Updated last year
- Publicly availalbe vulnarble by desgin vm/machines☆43Updated 3 years ago
- Ransomware Simulator for testing Blue Team Detections☆38Updated 3 years ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆43Updated 3 years ago
- Collaborative pentest tool with highly customizable tools☆75Updated 3 years ago
- automated password spraying tool☆147Updated 4 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆106Updated 3 years ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆68Updated this week
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆125Updated last year