eduardomcm / VelociraptorCompetitionView external linksLinks
☆11Apr 2, 2022Updated 3 years ago
Alternatives and similar repositories for VelociraptorCompetition
Users that are interested in VelociraptorCompetition are comparing it to the libraries listed below
Sorting:
- Copy metadata and digital signatures information from one Windows executable to another using Wine on a non-Windows platform☆19Apr 17, 2024Updated last year
- PyVelociraptor contains the python bindings for the Velociraptor API.☆21Feb 3, 2026Updated last week
- An experimental Velociraptor implementation using cloud infrastructure☆26Dec 2, 2025Updated 2 months ago
- Process Dumper written entirely in VBA.☆25Feb 13, 2021Updated 5 years ago
- Scrapes Audit Logs From Cloudflare and Streams to Std Out☆11May 6, 2025Updated 9 months ago
- ☆11Feb 14, 2023Updated 3 years ago
- A Python script that embeds Target VBS into LNK and when executed runs the VBS script from within.☆33Dec 5, 2022Updated 3 years ago
- Carves and recreates VSS catalog and store from Windows disk image.☆100Jan 24, 2023Updated 3 years ago
- Blue Team detection lab created with Terraform and Ansible in Azure.☆176Nov 20, 2024Updated last year
- This cheatsheet contains Active Directory (AD) exploitation techniques, showcasing methods used to identify and abuse misconfigurations o…☆54Jan 22, 2024Updated 2 years ago
- A recreation of the "Nobelium" malware based on Microsofts Malware analysis - Part 1: PDF2Pwn☆101Mar 8, 2023Updated 2 years ago
- Spawn Up quickly Elastic EDR Panel☆13Jan 29, 2022Updated 4 years ago
- A tool to find/download malware samples from various public repositories☆12Dec 22, 2021Updated 4 years ago
- Notes for CRTP☆42Dec 18, 2020Updated 5 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Aug 16, 2022Updated 3 years ago
- RemClip is a C# project which permits to steal user clipboard data and send it to a remote web server under attacker control☆15Sep 2, 2024Updated last year
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- A powershell script for creating a Windows honeyport.☆12Jun 24, 2015Updated 10 years ago
- ☆14Feb 23, 2021Updated 4 years ago
- ☆15Aug 13, 2014Updated 11 years ago
- Notes Template/Checklist for PEN-300 OSEP☆16Nov 20, 2021Updated 4 years ago
- A Sigma based detection pipeline☆13Dec 15, 2023Updated 2 years ago
- ☆12Aug 5, 2021Updated 4 years ago
- ☆12Aug 27, 2025Updated 5 months ago
- Notifications using Shoutrrr in GitHub Actions☆15Dec 9, 2025Updated 2 months ago
- Shell wrapper with keylogger (local log or syslog)☆13Nov 1, 2017Updated 8 years ago
- A Python client for the Global CVE Allocation System.☆17Jan 31, 2026Updated last week
- a port made of honey for blocking people☆13Jun 24, 2020Updated 5 years ago
- Run commands over RDP on massive number of hosts☆11Nov 26, 2018Updated 7 years ago
- A more functional and versatile way to search and filter SEC 4 form filing details (insider trading). Find trades of interest by ticker,…☆10Jan 19, 2022Updated 4 years ago
- Using a Google a Programmable Search Engine to make custom Digital Business Card Search Engine☆10Oct 4, 2022Updated 3 years ago
- simple C# portscanner - written for playing around with Metasploit's Execute-Assembly☆10Jul 1, 2023Updated 2 years ago
- A collection of handy and specific tools for the Red Teamer☆11Aug 13, 2024Updated last year
- Transform EQL detection rules to VQL artifacts☆12Nov 12, 2021Updated 4 years ago
- Python SDK and CLI utility for searchcode.com.☆10Feb 3, 2026Updated last week
- Open Source External Attack Surface Management☆49Apr 6, 2024Updated last year
- Use smb2 protocol to detect remote computer os version, support win7/server2008-win10/server2019☆59Aug 25, 2021Updated 4 years ago
- A third-party Gopher Assassin for the Havoc Framework.☆44Jan 1, 2024Updated 2 years ago
- UI for creating LNKs☆106Jun 16, 2021Updated 4 years ago