Red team oriented key finder and correlator
☆21Nov 21, 2025Updated 3 months ago
Alternatives and similar repositories for keygrep
Users that are interested in keygrep are comparing it to the libraries listed below
Sorting:
- Python C2 with JScript Implant☆15Nov 15, 2023Updated 2 years ago
- Emulate the handshake packets of an RDP server with python☆15Jun 26, 2018Updated 7 years ago
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆62Jun 2, 2018Updated 7 years ago
- A proof of concept for a clickjacking attack on macOS.☆97Feb 12, 2024Updated 2 years ago
- Shellcode library as a Go package☆70Nov 1, 2019Updated 6 years ago
- ☆16May 6, 2015Updated 10 years ago
- Experimenting with destructive file attacks in Go☆19May 20, 2019Updated 6 years ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆23Sep 15, 2021Updated 4 years ago
- Pure Honeypots with an automated bash script☆21Sep 9, 2021Updated 4 years ago
- Proper Payload Protection Prevents Poor Performance☆76Jul 27, 2022Updated 3 years ago
- ☆15Jul 20, 2022Updated 3 years ago
- Splunk app to compare Endpoint Detection and Response solutions based on MITRE ATT&CK evaluations (APT3, APT29, Carbanak + FIN7, Wizard S…☆19Sep 5, 2022Updated 3 years ago
- Curated list of well-developed C# Offensive Tools☆20Jan 30, 2020Updated 6 years ago
- Collection of macOS persistence methods and miscellaneous tools in JXA☆288Aug 3, 2023Updated 2 years ago
- macOS shellcode loader written in Objective-C☆49Jul 15, 2022Updated 3 years ago
- A repo containing some stagers and setup scripts for configuring Salt Stack to be a "bad"-ass C2☆18Jan 3, 2020Updated 6 years ago
- The Cloud Blocker☆108Feb 16, 2025Updated last year
- Cross-platform malware development library for anti-analysis techniques☆25Jul 27, 2021Updated 4 years ago
- Just another elf library☆31Dec 28, 2023Updated 2 years ago
- ☆29Jul 6, 2023Updated 2 years ago
- Privilege escalation using dmidecode☆21May 6, 2019Updated 6 years ago
- Sp00fer blog post -☆24Jul 19, 2022Updated 3 years ago
- Walking the PEB in VBA☆24Apr 6, 2020Updated 5 years ago
- Proof of concept - Covert Channel using Windows Filtering Platform (C#)☆21Aug 29, 2021Updated 4 years ago
- Reverse engineered APT38 DYEPACK samples used to empty SWIFT banking servers. Use caution when handling live binaries.☆23Mar 20, 2019Updated 6 years ago
- Antiscan.me automatization script☆30May 21, 2024Updated last year
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆26Jan 29, 2018Updated 8 years ago
- Obfuscate UDP traffic as RTP☆25Sep 25, 2023Updated 2 years ago
- Slides and Code for the BHUSA 2019 talk: Flying a False Flag☆238Nov 8, 2019Updated 6 years ago
- ☆110May 14, 2018Updated 7 years ago
- Application Hijack Scanner for macOS☆71Sep 28, 2021Updated 4 years ago
- Tool for automatic list generation of known TOR and VPN exit nodes☆29Dec 21, 2023Updated 2 years ago
- Event Data Collector☆39Jan 12, 2026Updated last month
- Ansible role to configure redirectors for red team C2☆30Nov 12, 2018Updated 7 years ago
- Library of traffic redirectors☆26Apr 7, 2020Updated 5 years ago
- Suite of tools to facilitate attacks against the Jamf macOS management platform.☆189Feb 10, 2021Updated 5 years ago
- Data Scientists Go To Jupyter☆68Mar 3, 2025Updated last year
- ☆121Jun 17, 2022Updated 3 years ago
- ☆129Sep 14, 2020Updated 5 years ago