ditekshen / is-wosLinks
Information Stealers Wall of Sheep (IS-WOS)
☆12Updated 4 years ago
Alternatives and similar repositories for is-wos
Users that are interested in is-wos are comparing it to the libraries listed below
Sorting:
- Sp00fer blog post -☆26Updated 2 years ago
- ☆12Updated 3 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- Automated Payload Test Controller☆10Updated 7 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆16Updated 5 years ago
- Pure Honeypots with an automated bash script☆20Updated 3 years ago
- Toolkit to detected abnormal activities on a Windows machine.☆11Updated 9 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 5 years ago
- USB HID driver emulation with PID/VID (0x3bca/0x27bb) of Plenom A/S Busylight Alpha, that is supported by Mimikatz. When mimikatz is exec…☆20Updated 2 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆14Updated 5 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- ☆22Updated 4 years ago
- ☆12Updated 4 years ago
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆12Updated 4 years ago
- A PowerShell script to prevent Sysmon from writing its events☆15Updated 5 years ago
- Some Pentesting Scripts☆11Updated 3 years ago
- Data EXfiltration TestER☆21Updated 5 years ago
- Operation Fast Cash - Hidden Cobra‘s AIX PowerPC malware dissected☆25Updated 6 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Updated 3 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 6 months ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆11Updated 4 years ago
- Ransoblin (Ransomware Bokoblin)☆18Updated 4 years ago
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆22Updated last year
- Yara Scanner For IMAP Feeds and saved Streams☆28Updated 5 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- Hashes of infamous malware☆26Updated last year
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online ma…☆13Updated 4 years ago
- Exploit for win10 SMB3.1☆17Updated 5 years ago
- Launch a Windows EXE file with this EXE file (application filter evasion)☆13Updated 8 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆9Updated 8 years ago