dobin / badfilesLinks
A detailed list of potentially dangerous file extensions
☆17Updated 6 months ago
Alternatives and similar repositories for badfiles
Users that are interested in badfiles are comparing it to the libraries listed below
Sorting:
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆40Updated 4 years ago
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆22Updated last year
- Windows Application Attack Surface Analyzer☆23Updated last year
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆28Updated 2 years ago
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆52Updated last year
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆58Updated 3 years ago
- USB HID driver emulation with PID/VID (0x3bca/0x27bb) of Plenom A/S Busylight Alpha, that is supported by Mimikatz. When mimikatz is exec…☆20Updated 3 years ago
- Nemesis agent for Mythic☆28Updated 3 weeks ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆11Updated 2 years ago
- Tools for offensive security of NetBackup infrastructures☆42Updated 2 years ago
- Top hashpwn rules☆20Updated 3 weeks ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆53Updated 2 years ago
- PDump is a project for dumping leaked credentials from DEHASHED☆16Updated last year
- Mythic Developer Series: Workshop Golang Agent☆26Updated 2 years ago
- Files to automatically deploy red team Active Directory test lab☆48Updated 3 years ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆44Updated last year
- ☆42Updated 7 months ago
- Automatically deploy Nemesis☆21Updated last year
- A Pentesters Confluence Keyword Scanner☆16Updated last year
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Updated 2 years ago
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆21Updated last month
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆21Updated 5 months ago
- POC tool to abuse windows server failover clusters☆49Updated 5 months ago
- CLI Search for Security Operators of MITRE ATT&CK URLs☆17Updated 3 years ago
- ☆14Updated 2 years ago
- The repository accompanying the Buer Emulation workshop☆23Updated 4 years ago
- HashKitty is a user-friendly cross-platform Python wrapper for Hashcat designed to provide an easy password cracking experience for both …☆42Updated last year
- An easy way to convert BloodHound output files into data that can be imported into reporting software like Dradis and Plextrac. Built by …☆18Updated 5 years ago
- Extension functionality for the NightHawk operator client☆26Updated 2 years ago
- Tools for playing w/ CobaltStrike config - extractin, detection, processing, etc...☆28Updated 2 years ago