ditekshen / is-wos
Information Stealers Wall of Sheep (IS-WOS)
☆12Updated 4 years ago
Alternatives and similar repositories for is-wos:
Users that are interested in is-wos are comparing it to the libraries listed below
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- Sp00fer blog post -☆26Updated 2 years ago
- Nexus of Android banking Trojans☆15Updated last year
- Malware campaigns and APTs research by BlackArrow☆18Updated 4 years ago
- ☆12Updated 3 years ago
- Hashes of infamous malware☆26Updated last year
- A collection of tools adversaries commonly use in an attack.☆14Updated 5 months ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated last year
- Automated Payload Test Controller☆9Updated 7 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆16Updated 5 years ago
- Standardizing Security Titles☆13Updated 2 years ago
- HoneyDB Python Module☆13Updated last year
- Pure Honeypots with an automated bash script☆20Updated 3 years ago
- Operation Fast Cash - Hidden Cobra‘s AIX PowerPC malware dissected☆25Updated 6 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Updated 3 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- ☆4Updated 2 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- Active Directory information dumper via LDAP☆12Updated 5 years ago
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆12Updated 4 years ago
- Random code snippets☆10Updated last year
- ☆12Updated 4 years ago
- Command-line tool to search for malware samples in various repositories☆10Updated 3 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆11Updated 4 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Updated 4 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Updated 4 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Updated 3 years ago
- ☆17Updated 3 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆21Updated 5 years ago
- Simple C2 over the Trello API☆38Updated 2 years ago