blacklotuslabs / ResearchLinks
The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.
☆12Updated 4 years ago
Alternatives and similar repositories for Research
Users that are interested in Research are comparing it to the libraries listed below
Sorting:
- ☆22Updated 4 years ago
- Presentation materials for talks I've given.☆20Updated 5 years ago
- various slides and presentations I've worked on☆19Updated 3 months ago
- Cobalt Strike log state tracking, parsing, and storage☆24Updated 5 years ago
- Plugins for the Viper Framework☆14Updated 5 years ago
- Powershell script which will take any payload and put it in the a bat script which delivers the payload. The payload is delivered using e…☆53Updated last year
- Impacket is a collection of Python classes for working with network protocols.☆17Updated 4 years ago
- Repository of Information sharing on threats and indicators☆12Updated 5 years ago
- \ PowerAvails Powershell /☆12Updated 6 years ago
- ☆17Updated 7 years ago
- ☆36Updated 5 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆12Updated 9 years ago
- Extracts Azure authentication tokens from PowerShell process minidumps.☆23Updated 2 years ago
- ☆12Updated 7 years ago
- ☆11Updated 6 years ago
- Crack your macros like the math pros.☆33Updated 8 years ago
- A cross platform tool for verifying credentials and executing single commands☆32Updated 6 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- ☆13Updated 4 years ago
- C# User Simulation☆32Updated 2 years ago
- Walking the PEB in VBA☆23Updated 5 years ago
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆33Updated 5 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Updated 6 years ago
- CVE-2018-18368 SEP Manager EoP Exploit☆17Updated 5 years ago
- ☆14Updated 7 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Updated 5 years ago
- ☆9Updated 8 years ago
- ☆11Updated 5 years ago
- Collection of scripts and tools that I created to aid in my testing.☆14Updated 3 years ago