degenerat3 / Sawmill
ELK stack for red team logs
☆12Updated 4 years ago
Alternatives and similar repositories for Sawmill:
Users that are interested in Sawmill are comparing it to the libraries listed below
- autopwn + deployment☆15Updated 2 years ago
- Raw socket library/framework for red team events☆34Updated 2 years ago
- Custom SOCKS proxy for redteam☆12Updated 3 years ago
- Resources I've found helpful for learning computing security.☆14Updated 5 years ago
- RITSEC Weekly Labs☆11Updated 6 years ago
- Walking the PEB in VBA☆22Updated 4 years ago
- ☆24Updated 4 years ago
- Deploy redteam infrastructure☆16Updated 4 years ago
- A lightweight red teaming platform utilizing concurrent nmap scans to populate a collaborative web server.☆22Updated 4 years ago
- ☆46Updated 4 years ago
- Tools for playing w/ CobaltStrike config - extractin, detection, processing, etc...☆27Updated last year
- ☆10Updated 4 years ago
- Exercises for C# Workshop at Wild West Hackin' Fest 2018 & 2019.☆64Updated 5 years ago
- Spin up RedTeam infrastructure on AWS via Ansible☆60Updated 4 years ago
- Python3 script to generate a macro to launch a Mythic payload. Author: Cedric Owens☆46Updated 3 years ago
- PE File Blessing - To continue or not to continue☆86Updated 5 years ago
- ☆28Updated 7 years ago
- ☆16Updated 3 years ago
- IBM RedCON 2020 - Throwing an AquaWrench into the Kernel☆44Updated 4 years ago
- ☆37Updated 5 years ago
- Specialized tool to dump Position Independent Code.☆21Updated 4 years ago
- Initial Commit of Coresploit☆56Updated 3 years ago
- ☆70Updated 6 years ago
- Protect your servers with a secret header☆29Updated 4 years ago
- ☆47Updated 5 years ago
- C2 over web☆8Updated 5 years ago
- Babel-Shellfish deobfuscates and scans Powershell scripts on real-time right before each line execution.☆43Updated 6 years ago
- Source code in Win32 ASM and C for a shellcode execution wrapper designed to mitigate the risk of shellcode execution on a host other tha…☆19Updated 8 years ago
- A C2 Bot using Raw Sockets on both Windows and Linux☆8Updated 3 years ago
- This repo is dedicated to a powerpoint exploit☆35Updated 4 years ago