chaitin / mimicryView external linksLinks
Mimicry is a dynamic deception tool that actively deceives an attacker during exploitation and post-exploitation.
☆60Jun 26, 2023Updated 2 years ago
Alternatives and similar repositories for mimicry
Users that are interested in mimicry are comparing it to the libraries listed below
Sorting:
- ☆34Apr 24, 2024Updated last year
- ☆19Dec 12, 2023Updated 2 years ago
- CIS Benchmark testing of Windows SIEM configuration☆45May 25, 2023Updated 2 years ago
- A command and control (C2) server☆58Jul 5, 2024Updated last year
- A python port of CCob's ThreadlessInject☆25Mar 18, 2023Updated 2 years ago
- Code injection is a technique where a process can insert a part of or all of its code from its own running process into another target pr…☆14Jun 15, 2023Updated 2 years ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆75Jun 27, 2023Updated 2 years ago
- Modular framework to exploit UPS devices☆64Mar 1, 2023Updated 2 years ago
- ☆80Apr 18, 2023Updated 2 years ago
- ☆90Feb 11, 2022Updated 4 years ago
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆60Feb 4, 2025Updated last year
- Site fast fuzzing with chorme extension.☆24Feb 4, 2022Updated 4 years ago
- ☆46Mar 20, 2021Updated 4 years ago
- Terraform playbook of a vulnerable Azure deployment☆10Apr 28, 2022Updated 3 years ago
- CVE-2025-55182-bypass-waf☆30Jan 8, 2026Updated last month
- ☆13Mar 1, 2024Updated last year
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environments☆12Nov 23, 2023Updated 2 years ago
- ShellcodeFluctuation PoC ported to Nim☆79Oct 14, 2022Updated 3 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Nov 8, 2022Updated 3 years ago
- ☆110Feb 21, 2023Updated 2 years ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Mar 21, 2023Updated 2 years ago
- Cloud Exploit Framework☆113May 11, 2022Updated 3 years ago
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆32Jan 17, 2022Updated 4 years ago
- Cobalt Strike/C2 Servers☆13Apr 22, 2021Updated 4 years ago
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service, versions and C…☆17Updated this week
- Expand component library, modules & ui components☆13Jan 7, 2023Updated 3 years ago
- PoC-Malware-TTPs☆49Mar 26, 2023Updated 2 years ago
- Modular malware analysis artifact collection and correlation framework☆54Apr 23, 2024Updated last year
- A GraphQL enumeration and extraction tool☆134Jan 29, 2023Updated 3 years ago
- ReconPal: Leveraging NLP for Infosec☆57May 23, 2022Updated 3 years ago
- A Lazy Programmer's Tips for Avoiding the SOC ~ BSides Belfast 2024☆16Sep 12, 2024Updated last year
- CLI Search for Security Operators of MITRE ATT&CK URLs☆17Jan 5, 2023Updated 3 years ago
- A Golang Discord C2 unlike any other. DCVC2 uses RTP packets over a voice channel to transmit all data leaving no operational traces in t…☆133Nov 5, 2024Updated last year
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆178Feb 14, 2023Updated 2 years ago
- A fast enumeration tool for Windows Active Directory Pentesting written in Go☆277Jan 14, 2023Updated 3 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆36Jan 20, 2022Updated 4 years ago
- Neton is a tool for getting information from Internet connected sandboxes☆96Nov 15, 2022Updated 3 years ago
- A PoC executing shellcode in Dart☆17Jun 28, 2022Updated 3 years ago
- With the help of this docker image, you can easily access PEzor on your system!☆15Mar 10, 2022Updated 3 years ago