byt3n33dl3 / OffensiveYARALinks
π¬ππ₯π for offensive, YARA can do that!?
β11Updated last year
Alternatives and similar repositories for OffensiveYARA
Users that are interested in OffensiveYARA are comparing it to the libraries listed below
Sorting:
- MFA and 2FA chainers, authentication PenTesting frameworks.β19Updated last year
- Combining "Authentication" to convey on Active Directory. Advanced Kerberos attacks.β15Updated last year
- Kerberos Attacks by cracking the system or router that provides a gateway for Active Directory.β20Updated last year
- Offshore the Maze Octopus for Remote Admin Access.β27Updated last year
- Prevent users from accessing online services. Distributed Denied of Service Attack server that cuts off targets or surrounding Infrastrucβ¦β10Updated last year
- BloodHound Attack Research Kit. BARK is an Attack Kit for Attack path Management.β13Updated last year
- Kerberos Attacks From Networks or Domain controller log Perspective through HMAC in exchanges.β30Updated last year
- WPA frequency sessions, framworks of customs firmware and intensity of RF.β13Updated last year
- Docker Payloads (Bypass) Data at the endpoint when running NestJS APK.β17Updated last year
- Weaponizing Nim, with the elegance of modern logic programming language. Nim can do that!?β12Updated last year
- Configurations and Deprecated payloads. Some useful scripts for Cobaltstrike.β17Updated last year
- A swiss army Knife for Penetration testing Networks and Active Directory.β45Updated 8 months ago
- Password hash decryption utilities, fastest and most advanced password cracking. Supports hundreds of hash & cipher types, runs on many oβ¦β48Updated last year
- Enterprise level of Parallelization SSH (Concurrency), Logon Penetration Testing.β26Updated 9 months ago
- An Open source Pentesting Software for Mapping Injection points to Takeover.β53Updated 10 months ago
- For radio frequency research severe damage to privacy or modify wireless devices.β16Updated 11 months ago
- Encrypting directory and access. Execute the Commands Based on external inputs RCE.β11Updated last year
- Nikto the Alienware, scanning for misconfigurations and Information disclosures on WebApp.β17Updated last year
- Seven Degrees of Domain Adminβ84Updated 10 months ago
- yarn BHCE, Six Degrees of Domain Admin. Using Neo4j to store Networks objects and relationships as graph nodes and edges, enabling path-fβ¦β55Updated 6 months ago
- Ticket harvesting frameworks for kerberos pentesting.β43Updated 11 months ago
- P O I S O N I N Gβ20Updated last year
- Sharp and GPO abuse for PrivEsc, Data Collector for BloodHound and BlackMarlinExec.β105Updated 4 months ago
- Github Profile Readmeβ36Updated 4 months ago
- The Network Relay Execution Tool.β17Updated 11 months ago
- Backdoor for Rubella on Shell'sβ32Updated last year
- rootkit and kernel pentesting for Linux, most advanced malware for SUID.β10Updated last year
- Ronin the Shogun for XSS and XSRF bug-hunting.β14Updated 11 months ago
- Release Neo the Evil Ducky, A scripts into any Hardware or drive Devices.β12Updated last year
- Remote access Trojan based (Client) After the Malware hits the Kernel.β11Updated last year