ditekshen / is-wos
Information Stealers Wall of Sheep (IS-WOS)
☆12Updated 4 years ago
Alternatives and similar repositories for is-wos:
Users that are interested in is-wos are comparing it to the libraries listed below
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 4 years ago
- ☆22Updated 4 years ago
- Sp00fer blog post -☆26Updated 2 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 4 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 2 months ago
- Scan and decode NetWire logs☆11Updated 2 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆30Updated 2 years ago
- ☆12Updated 3 years ago
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆12Updated 4 years ago
- Hashes of infamous malware☆25Updated last year
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆15Updated 4 years ago
- Ransoblin (Ransomware Bokoblin)☆17Updated 4 years ago
- A PowerShell script to prevent Sysmon from writing its events☆15Updated 4 years ago
- Pure Honeypots with an automated bash script☆20Updated 3 years ago
- Starting Code for my How to Write Malware 101 Class. This is a Proof of Concept of a C# RAT (Remote Access Trojan) made by Sean Pierce (@…☆22Updated 6 years ago
- Parser for Sdba memory pool tags☆17Updated 3 years ago
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆22Updated 7 years ago
- SecretSmasher is a Red Team tool used for brute-forcing Cisco enable passwords☆13Updated 4 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Updated 3 years ago
- ☆37Updated 3 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆11Updated 4 years ago
- Nexus of Android banking Trojans☆15Updated last year
- Catalog Red Team techniques that cause popups in various macOS versions☆14Updated 2 months ago
- Machine Learning basics with phishing dataset☆10Updated 3 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 3 months ago
- s3eker is an extensible way to find open S3 buckets.☆17Updated 4 years ago
- Data EXfiltration TestER☆21Updated 5 years ago
- ☆34Updated 3 weeks ago
- Kibana app for RedELK☆16Updated last year