ccelikanil / GlytchC2Links
A FAFO project: Command execution and data exfiltration of any kind through live streaming platforms
☆24Updated last month
Alternatives and similar repositories for GlytchC2
Users that are interested in GlytchC2 are comparing it to the libraries listed below
Sorting:
- WifiForge is a tool developed by Black Hills InfoSec to help train Pentesters on different Wi-Fi attack vectors and Wireless capabilities…☆363Updated this week
- ☆192Updated 8 months ago
- DECeption with Evaluative Integrated Validation Engine (DECEIVE): Let an LLM do all the hard honeypot work!☆263Updated 3 months ago
- This repository is a compilation of all APT simulations that target many vital sectors,both private and governmental. The simulation inc…☆726Updated this week
- Creation of a laboratory for malware analysis in AWS☆104Updated 2 years ago
- TCM PEH Course AD Lab Build Script (Hydra-DC, Punisher-Workstation, Spiderman-Workstation)☆145Updated last year
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆714Updated last month
- DFIR LABS - A compilation of challenges that aims to provide practice in simple to advanced concepts in the following topics: Digital For…☆357Updated last month
- Handbook of windows forensic artifacts across multiple Windows version with interpretation tips and some examples. Work in progress!☆387Updated last year
- A general purpose cheat sheet for pentesting and OSCP certification☆197Updated 6 months ago
- ☆16Updated last month
- CLI tools for forensic investigation of Windows artifacts☆347Updated 2 months ago
- Obsidian Templates for OSCP, CPTS, and Training labs☆94Updated 7 months ago
- Obsidian Notes used to passed the OSCP exam and most HTB machines / challenges.☆35Updated 4 months ago
- Gets updates from various clearnet domains and ransomware threat actor domains☆403Updated last year
- ☆51Updated 2 years ago
- Standard collection of rules for capa: the tool for enumerating the capabilities of programs☆57Updated last year
- Practical Windows Forensics Training☆691Updated last year
- Jupyter Notebooks for the Blue Team☆146Updated 6 months ago
- /dev/tty☆28Updated last month
- A repository of credential stealer formats☆227Updated 3 months ago
- Purple Team Exercise Framework☆736Updated last year
- ☆23Updated last year
- Labs for Practical Malware Analysis & Triage☆1,024Updated 5 months ago
- Ansible Scripts to Build Out My Parrot☆219Updated 7 months ago
- ICSGoat: A Damn Vulnerable ICS Infrastructure☆25Updated last year
- OT security monitoring #nsacyber☆607Updated last year
- Overflowme is a walkthrough to learn the basics of binary exploitation. Detailed instructions, stack diagrams and fully commented assembl…☆58Updated 4 months ago
- My notes while studying for the PNPT from TCM Security.☆84Updated last year
- Describing and documenting the process of deploying a HomeLab for security research and training☆40Updated 4 months ago