facebookarchive / WEASELLinks
DNS covert channel implant for Red Teams.
☆733Updated 5 years ago
Alternatives and similar repositories for WEASEL
Users that are interested in WEASEL are comparing it to the libraries listed below
Sorting:
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆601Updated last year
- GTRS - Google Translator Reverse Shell☆615Updated 7 months ago
- A guide and tool for cracking ssh known_hosts files with hashcat☆331Updated last year
- A wanna be swiss army knife for data encryption, exfiltration and covert communication.☆539Updated 2 years ago
- Red team & penetration testing tools to exploit the capabilities of Intel AMT☆258Updated 4 years ago
- Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term o…☆2,464Updated 4 months ago
- https://twitter.com/itsreallynick/status/1120410950430089224☆396Updated 6 years ago
- A mostly-serverless distributed hash cracking platform☆807Updated last year
- A Golang implant that uses Slack as a command and control server☆462Updated 2 years ago
- This repo contains logstash of various honeypots☆174Updated 5 years ago
- A script that automates generation of OpenSSL reverse shells☆301Updated 4 years ago
- Modern tactical exploitation toolkit.☆849Updated 10 months ago
- Armory is a tool meant to take in a lot of external and discovery data from a lot of tools, add it to a database and correlate all of rel…☆419Updated this week
- mXtract - Memory Extractor & Analyzer☆592Updated 3 years ago
- Orc is a post-exploitation framework for Linux written in Bash☆394Updated 5 years ago
- A private botnet using multiple cloud environments for pentesters and red teamers. - Built by the community during a hackathon at the WWH…☆625Updated 2 years ago
- This tool can forward TCP traffic over DNS protocol. Non-compile clients + socks5 support.☆410Updated 5 years ago
- HonSSH is designed to log all SSH communications between a client and server.☆375Updated 3 years ago
- Open source offensive security platform for red team, by red team.☆385Updated 7 years ago
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security …☆1,013Updated 5 years ago
- A Linux Auditd rule set mapped to MITRE's Attack Framework☆792Updated 4 years ago
- Advanced Honeypot framework.☆1,259Updated last year
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆595Updated 4 years ago
- swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searc…☆522Updated 3 years ago
- Password spraying using AWS Lambda for IP rotation☆627Updated 2 years ago
- SSHPry v2 - Spy & Control os SSH Connected client's TTY☆399Updated 7 years ago
- TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.☆1,282Updated 3 years ago
- Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and l…☆544Updated 4 years ago
- A medium interaction printer honeypot 🍯☆202Updated last year
- FCL (Fileless Command Lines) - Known command lines of fileless malicious executions☆467Updated 4 years ago