☆53Mar 8, 2021Updated 4 years ago
Alternatives and similar repositories for ATMMalScan
Users that are interested in ATMMalScan are comparing it to the libraries listed below
Sorting:
- Python tool to find vulnerable AD object and generating csv report☆14Jul 4, 2022Updated 3 years ago
- Carbon Black Response IR tool☆55Dec 10, 2020Updated 5 years ago
- JXA implementation of some SwiftBelt functions. Author: Cedric Owens☆46Jun 22, 2023Updated 2 years ago
- Spin up RedTeam infrastructure on AWS via Ansible☆64Aug 25, 2020Updated 5 years ago
- Determine if the WebClient Service (WebDAV) is running on a remote system☆27Sep 29, 2021Updated 4 years ago
- "A Practical Recipe for Hardware Implants" presentation materials.☆13Nov 10, 2020Updated 5 years ago
- PoC Thread Execution Hijacking for Win32 Code Injection☆177Aug 8, 2024Updated last year
- CTI-URLScan is a command line tool to enable analysts to search URLscan.io submissions. Pull screenshot and DOM content. As well as, auto…☆10Mar 2, 2021Updated 5 years ago
- Queries for Carbon Black Response☆11Feb 11, 2020Updated 6 years ago
- Blackcert monitors Certificate Transparency Logs for a keyword. Blackcert collects any certificate changes for this keyword and also chec…☆10Dec 8, 2022Updated 3 years ago
- C# exfiltration tool☆13Sep 24, 2021Updated 4 years ago
- ☆20Jan 19, 2021Updated 5 years ago
- A Golang CLI for the MITRE ATT&CK Framework☆14Apr 28, 2025Updated 10 months ago
- CobaltStrike AggressorScripts for the lazy☆10Jul 22, 2022Updated 3 years ago
- Searches and tests SQL dorks to find vulnerable sites.☆10Oct 15, 2019Updated 6 years ago
- ☆14Jun 2, 2025Updated 9 months ago
- Cobalt Strike Aggressor script menu for Powerview/SharpView☆28May 8, 2019Updated 6 years ago
- SNIcat☆128Aug 19, 2021Updated 4 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆96Jul 26, 2021Updated 4 years ago
- ☆93Jul 30, 2025Updated 7 months ago
- A BOF.NET program to split a file into smaller chunks and email it via a specified SMTP relay.☆15Jun 24, 2021Updated 4 years ago
- Kibana app for RedELK☆18Mar 19, 2023Updated 2 years ago
- Basic network port scanner created in C#☆19Aug 1, 2019Updated 6 years ago
- DNS Misconfiguration : S0x4 - Same Site Scripting Scanner☆15Jan 20, 2021Updated 5 years ago
- Routopsy - Hacking Routers with Routers☆179Jul 30, 2021Updated 4 years ago
- A small .NET compression utility☆58Feb 2, 2022Updated 4 years ago
- ☆14Oct 25, 2019Updated 6 years ago
- APT34/OILRIG leak☆11Jun 25, 2019Updated 6 years ago
- Google hacking, also named Google dorking, is a hacker technique that uses Google Search and other Google applications to find security h…☆14May 8, 2021Updated 4 years ago
- ☆19Aug 2, 2020Updated 5 years ago
- A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies☆325Apr 8, 2023Updated 2 years ago
- Yet another PoC for https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows☆143Jul 11, 2020Updated 5 years ago
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆19Jun 24, 2021Updated 4 years ago
- ☆22Mar 4, 2025Updated last year
- A python package that helps with analysis of MSI files☆14Mar 28, 2021Updated 4 years ago
- Network Finger Printer☆16Nov 10, 2017Updated 8 years ago
- Ansible role to deploy RedELK server☆19Sep 11, 2023Updated 2 years ago
- Wireless Miniaturized Device☆19Jan 27, 2018Updated 8 years ago
- Analysis of the XFS_DIRECT ATM malware used for jackpotting with a PI ZERO W and the P4WNP1 framework on board☆157Oct 22, 2019Updated 6 years ago