facebookarchive / WEASEL
DNS covert channel implant for Red Teams.
☆734Updated 5 years ago
Alternatives and similar repositories for WEASEL:
Users that are interested in WEASEL are comparing it to the libraries listed below
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆597Updated 8 months ago
- A guide and tool for cracking ssh known_hosts files with hashcat☆327Updated last year
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆535Updated 11 months ago
- GTRS - Google Translator Reverse Shell☆616Updated 4 months ago
- A script that automates generation of OpenSSL reverse shells☆300Updated 4 years ago
- A wanna be swiss army knife for data encryption, exfiltration and covert communication.☆537Updated 2 years ago
- Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term o…☆2,420Updated 3 weeks ago
- Data exfiltration over DNS request covert channel☆856Updated 9 months ago
- A mostly-serverless distributed hash cracking platform☆802Updated 10 months ago
- (extensible) Data Exfiltration Toolkit (DET)☆828Updated 7 years ago
- A database of common, interesting or useful commands, in one handy referable form☆748Updated last year
- A medium interaction printer honeypot 🍯☆202Updated last year
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security …☆1,003Updated 4 years ago
- A Golang implant that uses Slack as a command and control server☆460Updated last year
- Armory is a tool meant to take in a lot of external and discovery data from a lot of tools, add it to a database and correlate all of rel…☆418Updated 5 months ago
- $50 Million CTF from Hackerone - Writeup☆588Updated 5 years ago
- FCL (Fileless Command Lines) - Known command lines of fileless malicious executions☆465Updated 3 years ago
- This repo contains logstash of various honeypots☆175Updated 4 years ago
- This tool can forward TCP traffic over DNS protocol. Non-compile clients + socks5 support.☆406Updated 5 years ago
- Xori is an automation-ready disassembly and static analysis library for PE32, 32+ and shellcode☆726Updated 2 years ago
- mXtract - Memory Extractor & Analyzer☆585Updated 3 years ago
- Open source offensive security platform for red team, by red team.☆382Updated 7 years ago
- Password spraying using AWS Lambda for IP rotation☆595Updated 2 years ago
- A Linux Auditd rule set mapped to MITRE's Attack Framework☆780Updated 4 years ago
- Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.☆621Updated 4 years ago
- FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network …☆664Updated last year
- Modern tactical exploitation toolkit.☆841Updated 7 months ago
- AI-based, context-driven network device ranking☆295Updated last year
- SSHPry v2 - Spy & Control os SSH Connected client's TTY☆398Updated 7 years ago
- Bash post exploitation toolkit☆725Updated last year