degenerat3 / SawmillLinks
ELK stack for red team logs
☆12Updated 4 years ago
Alternatives and similar repositories for Sawmill
Users that are interested in Sawmill are comparing it to the libraries listed below
Sorting:
- autopwn + deployment☆15Updated 3 years ago
- various slides and presentations I've worked on☆19Updated 4 months ago
- Raw socket library/framework for red team events☆34Updated 2 years ago
- Exercises for C# Workshop at Wild West Hackin' Fest 2018 & 2019.☆64Updated 5 years ago
- AMSI detection PoC☆32Updated 5 years ago
- Visual Studio (C++) Solution Template for Payloads☆18Updated 5 years ago
- ☆25Updated 4 years ago
- PE File Blessing - To continue or not to continue☆87Updated 5 years ago
- A lightweight red teaming platform utilizing concurrent nmap scans to populate a collaborative web server.☆22Updated 4 years ago
- ☆60Updated 5 years ago
- Python3 script to generate a macro to launch a Mythic payload. Author: Cedric Owens☆47Updated 4 years ago
- Script that searches through all COM objects for any methods containing a key word of your choosing.☆73Updated 5 years ago
- My python3 implementation of a Forward Shell☆36Updated 6 years ago
- Babel-Shellfish deobfuscates and scans Powershell scripts on real-time right before each line execution.☆43Updated 6 years ago
- Walking the PEB in VBA☆24Updated 5 years ago
- ☆70Updated 6 years ago
- Reproducible and extensible BloodHound playbooks☆44Updated 5 years ago
- ☆11Updated 5 years ago
- extracts shellcode from a nasm compile macho binary☆16Updated 4 years ago
- Example VBA Macro for MacOS Mojave☆67Updated 6 years ago
- Any presentation we've given at FortyNorth Security☆34Updated 3 years ago
- C# User Simulation☆32Updated 2 years ago
- JXA implementation of some SwiftBelt functions. Author: Cedric Owens☆44Updated 2 years ago
- Custom SOCKS proxy for redteam☆12Updated 3 years ago
- NGINX module to allow for RCE through a specific header☆27Updated 2 years ago
- CVE-2018-18368 SEP Manager EoP Exploit☆17Updated 5 years ago
- BloodHound Cypher Queries Ported to a Jupyter Notebook☆53Updated 5 years ago
- Vulnerabilities, exploits, and PoCs☆37Updated 2 months ago
- SilkETW & SilkService☆40Updated 5 years ago
- A repository where I share my injection implemintations☆29Updated 5 years ago