carnal0wnage / malicious_file_makerView external linksLinks
malicious file maker/sender to create and send malicious attachments to test your email filter/alerting
☆71Oct 19, 2017Updated 8 years ago
Alternatives and similar repositories for malicious_file_maker
Users that are interested in malicious_file_maker are comparing it to the libraries listed below
Sorting:
- Make Windows LNK file with python (pylnk)☆66Jun 4, 2016Updated 9 years ago
- scripts for pentesting☆86Aug 21, 2018Updated 7 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- ☆121Oct 6, 2015Updated 10 years ago
- Registry to JSON. This Project is for learning purposes and is not maintained.☆12Dec 28, 2021Updated 4 years ago
- LNK to JSON☆14Mar 7, 2019Updated 6 years ago
- Pdf File : Exfiltration and Uploading DATA by DNS Traffic (AAAA Records)☆10Jun 7, 2023Updated 2 years ago
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆18Mar 3, 2022Updated 3 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- Serving files with conditions, serverside keying and more.☆18May 26, 2022Updated 3 years ago
- PowerShell Memory Pulling script☆19Mar 24, 2015Updated 10 years ago
- Automated Responder/secretsdump.py cracking☆187May 16, 2016Updated 9 years ago
- InfoPath Phishing Repo Resource☆68Oct 26, 2017Updated 8 years ago
- Clean public password dump files and store in ELK☆37Jan 24, 2018Updated 8 years ago
- A tool to triage screenshots☆20Jun 29, 2017Updated 8 years ago
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,111Nov 3, 2017Updated 8 years ago
- Cobalt Strike SCT payload obfuscator☆143Jul 7, 2017Updated 8 years ago
- Malicious Macro Generator☆831Apr 17, 2019Updated 6 years ago
- An interactive OOB XXE data exfiltration tool☆91May 31, 2017Updated 8 years ago
- Automating forensic data extraction, reduction, and overall triage of cold disk and memory images.☆21Mar 12, 2019Updated 6 years ago
- Recover event log entries from an image by heurisitically looking for record structures.☆26Oct 9, 2015Updated 10 years ago
- Collection of single use scripts I worte for windows forensics☆27Feb 1, 2012Updated 14 years ago
- Miscellaneous for various things☆21Nov 19, 2024Updated last year
- Custom stagers with python encrypting proxy☆40May 25, 2015Updated 10 years ago
- A repo of fake committed secrets to test tools that find committed secrets ([dont submit for BB :-) ]☆10Mar 22, 2018Updated 7 years ago
- Various PoCs☆502Jan 27, 2020Updated 6 years ago
- A multithreaded tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a network at-scale v…☆449May 25, 2022Updated 3 years ago
- This PowerShell script will determine if your connection to external servers over HTTPS is being decrypted by an intercepting proxy such …☆68Feb 9, 2018Updated 8 years ago
- Lazykatz is an automation developed to extract credentials from remote targets protected with AV and/or application whitelisting software…☆199Nov 19, 2017Updated 8 years ago
- ☆45Nov 5, 2018Updated 7 years ago
- A Generic Windows Memory Scraping Tool☆71Apr 20, 2017Updated 8 years ago
- Repository for LNK stuff☆31Aug 31, 2022Updated 3 years ago
- CScriptShell, a Powershell Host running within cscript.exe☆162Apr 11, 2017Updated 8 years ago
- Wrapper for TSK (Sleuth Kit) Bindings☆12Jan 10, 2023Updated 3 years ago
- ☆11Mar 9, 2018Updated 7 years ago
- Assorted, MIT licensed, threat hunting rules from @bradleyjkemp☆14Mar 11, 2022Updated 3 years ago
- Vulnerability teaching showcase☆13Apr 19, 2016Updated 9 years ago
- A utility to force query DNS over DoH off of CloudFlare API when DNS block is in place☆10Aug 26, 2018Updated 7 years ago
- Parsers for common structures across windows formats.☆12Aug 23, 2023Updated 2 years ago