ch3k1 / squidmagic
analyze a web-based network traffic πΆ to detect central command and control servers
β78Updated 6 years ago
Related projects β
Alternatives and complementary repositories for squidmagic
- Metasploit Frameworkβ26Updated 7 years ago
- Simple IP Information Tools for Reputation Data Analysisβ23Updated 5 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.β65Updated 5 years ago
- This tool extract domains from IP address based in the information saved in virustotal.β24Updated 7 years ago
- Simple reverse ICMP shellβ40Updated 11 years ago
- hemingway is a simple and easy to use spear phishing helper.β38Updated 7 years ago
- Basic Maltego Transforms for looking up SSL certs and IP info from censys.ioβ41Updated 7 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...β72Updated 5 years ago
- Transforms for the AlienVault OTX serviceβ39Updated 8 years ago
- The Intelligent Honey Net Project attempts to create actionable information from honeypotsβ62Updated 9 years ago
- Slides from my ShellCon Talk, OSINT for Pen Tests, given 10/19.β61Updated 6 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting β¦β86Updated 6 years ago
- Computer Network Defender's Toolkit, specializing in active defense techniques.β6Updated 5 years ago
- Analyse SQL injection attempts in web server logsβ82Updated 7 years ago
- Megatron - A System for Abuse- and Incident Handlingβ41Updated 7 years ago
- Cyber Intel Managementβ45Updated 6 years ago
- Security tool to trace URL's jumps across the rel links to obtain the last URLβ48Updated last year
- OSINT Threat Intel Interface - CLI for HoneyDBβ113Updated 5 years ago
- Based on the Volatility framework, this script will run various plugins as well as create a timeline, or use YARA/ClamAV/VirusTotal to fiβ¦β49Updated 7 years ago
- Source Code Intelligenceβ30Updated 7 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes resβ¦β43Updated 5 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwordsβ46Updated 7 years ago
- A few transforms and a machine for parsing Nmap XML resultsβ35Updated 8 years ago