ch3k1 / squidmagic
analyze a web-based network traffic πΆ to detect central command and control servers
β79Updated 6 years ago
Alternatives and similar repositories for squidmagic:
Users that are interested in squidmagic are comparing it to the libraries listed below
- This tool extract domains from IP address based in the information saved in virustotal.β24Updated 8 years ago
- Metasploit Frameworkβ26Updated 7 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes resβ¦β44Updated 5 years ago
- AutoBrowser Screenshotβ48Updated 8 years ago
- Simple reverse ICMP shellβ41Updated 11 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.β66Updated 6 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwordsβ46Updated 7 years ago
- Simple IP Information Tools for Reputation Data Analysisβ23Updated 6 years ago
- hemingway is a simple and easy to use spear phishing helper.β40Updated 8 years ago
- Prometheus Firewall Analyzerβ47Updated 9 years ago
- A warehouse for your malwareβ134Updated 11 years ago
- Basic Maltego Transforms for looking up SSL certs and IP info from censys.ioβ41Updated 7 years ago
- Powershell fork of Monohard by Carlos Ganoza P. This botnet/backdoor was designed to egress over unecrypted web using very little, but eβ¦β41Updated 3 years ago
- Metasploit Usage Wikiβ48Updated 9 years ago
- β61Updated 6 years ago
- A collection of useful scripts for penetration testersβ82Updated 12 years ago
- Honeypot (Dionaea and kippo) setup scriptβ84Updated 8 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting β¦β87Updated 6 years ago
- Ransack Post Exploitation Toolβ16Updated 8 years ago
- Data Exfiltration and Command Execution via AAAA Recordsβ67Updated 8 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysisβ43Updated 7 years ago
- Computer Network Defender's Toolkit, specializing in active defense techniques.β7Updated 5 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.β32Updated 8 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flashβ28Updated 8 years ago
- Simple Bash script to retrieve basic system information.β30Updated 6 years ago
- Source Code Intelligenceβ30Updated 7 years ago
- Cross Distribution Exploit Testingβ27Updated 9 years ago
- A collection of scripts to initialize a windows VM to run all the malwares!β105Updated 4 years ago
- Smoking Linux Every Day!β54Updated 4 years ago
- BTG's purpose is to make fast and efficient search on IOCβ70Updated 6 years ago