benstew / awesome-data-exfiltrationLinks
Curated list of awesome, open source data exfiltration tools
☆61Updated 3 years ago
Alternatives and similar repositories for awesome-data-exfiltration
Users that are interested in awesome-data-exfiltration are comparing it to the libraries listed below
Sorting:
- ☆64Updated 4 years ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆114Updated 3 years ago
- This contains a list of Blue Team Tools that I use daily, and have stored here for reference.☆35Updated 7 years ago
- Repository of resources for configuring a Red Team SIEM using Elastic☆101Updated 7 years ago
- Collaborative pentest tool with highly customizable tools☆75Updated 3 years ago
- Shodan Monitoring integration for TheHive.☆131Updated 9 months ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆43Updated 3 years ago
- Tracking my journey towards earning my OSCP. This includes the process of everything that I learn along the way.☆47Updated 3 years ago
- OSCP guide and Red Team assessment Guide☆35Updated 5 years ago
- Easy to configure Honeypot for Blue Team☆43Updated 3 months ago
- Malware vulnerability intel tool for third-party attackers☆122Updated 10 months ago
- ☆48Updated 9 months ago
- Tool to discover external and internal network attack surface☆203Updated last year
- Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translatin…☆126Updated 5 months ago
- A Python package is used to execute Atomic Red Team tests (Atomics) across multiple operating system environments.☆135Updated last year
- Commands used in Windows penetration tests☆54Updated 3 years ago
- ☆94Updated 2 years ago
- Ransomware Simulator for testing Blue Team Detections☆37Updated 3 years ago
- Run several volatility plugins at the same time☆114Updated 2 years ago
- A set of recipes useful in pentesting and red teaming scenarios☆144Updated 2 years ago
- A Burp Pro extension that adds log4shell checks to Burp Scanner.☆27Updated 3 years ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆68Updated last month
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆95Updated 4 years ago
- ☆69Updated 3 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆99Updated 5 years ago
- Data exfiltration and covert communication tool☆39Updated 2 years ago
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆130Updated last month
- Reads and prints information from the website MalAPI.io☆39Updated 3 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 10 months ago
- DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)☆60Updated 4 years ago