This repository contains the code and PCAPS used for the SANS webinar, "Hacking Proprietary Protocols" given on February 23, 2021.
☆34Apr 9, 2022Updated 4 years ago
Alternatives and similar repositories for protohacking
Users that are interested in protohacking are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- My Jupyter Notebooks☆37Mar 14, 2025Updated last year
- Git for me to put all my forensics stuff☆23Sep 2, 2025Updated 7 months ago
- ☆29May 25, 2021Updated 4 years ago
- Active Directory Purple Team Playbook☆116May 8, 2023Updated 2 years ago
- Ansible scripts to build an attack box☆24Sep 24, 2018Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Use Terraform to Provision Your Own Cloud-Based Remote Browsing Workstation☆26Apr 28, 2024Updated 2 years ago
- ☆13Aug 28, 2014Updated 11 years ago
- VDA Labs scripts for the GHIDRA reverse engineering toolset☆29Mar 8, 2019Updated 7 years ago
- A MITRE ATT&CK Lookup Tool☆46Apr 25, 2024Updated 2 years ago
- ☆19Jun 26, 2017Updated 8 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- EPSScall☆11Jun 10, 2022Updated 3 years ago
- This is a PAM Skeleton Key that can be used for persistence, lateral movement, and privilege escalation.☆43Apr 23, 2026Updated last week
- ☆20Feb 22, 2021Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Notebooks created to attack and secure Active Directory environments☆27Nov 18, 2019Updated 6 years ago
- Admin for☆16Jun 3, 2018Updated 7 years ago
- Talk slides and material☆38Mar 24, 2024Updated 2 years ago
- A PoC backdoor that uses Gmail as a C&C server☆13Jun 28, 2020Updated 5 years ago
- Framework for vulnerability fuzzing and reverse-engineering tool development.☆23Jul 25, 2023Updated 2 years ago
- Created by David Maloney via the GitHub Connector☆12Apr 14, 2026Updated 2 weeks ago
- Invoke-Forensics provides PowerShell commands to simplify working with the forensic tools KAPE and RegRipper.☆117Nov 28, 2023Updated 2 years ago
- Distribution of the SANS SEC504 Windows Cheat Sheet Lab☆81May 25, 2020Updated 5 years ago
- Experimental python3.x based ICMP bind shell listener using scapy and windows 'compatible'☆10May 29, 2020Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A tool to modify timestamps in a packet capture to a user selected date☆31Aug 11, 2021Updated 4 years ago
- Applied Purple Teaming - (ITOCI4hr) - Infrastructure, Threat Optics, and Continuous Improvement - June 6, 2020☆324Jan 22, 2021Updated 5 years ago
- A set of tools and procedures for automating NSM and NIDS deployments in AWS☆15Oct 16, 2020Updated 5 years ago
- Pythonize Intruder Payload☆13Dec 15, 2020Updated 5 years ago
- Scapy hands-on☆36Nov 16, 2023Updated 2 years ago
- Ansible Cobalt Strike (Docker)☆15Jan 8, 2022Updated 4 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Jan 6, 2021Updated 5 years ago
- QEmu backend for avatar²☆22Mar 29, 2025Updated last year
- A small collection of Burp Suite extensions, written in Python☆10Nov 19, 2016Updated 9 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Rust library for multi-file readahead / dropbehind☆14May 31, 2017Updated 8 years ago
- Identifies physical locations where a laptop has been based upon wireless profiles and wireless data recorded in event logs☆103Jun 2, 2021Updated 4 years ago
- ☆24Mar 2, 2026Updated last month
- Serverless honeytoken 🕵🏻♂️☆81Jan 10, 2023Updated 3 years ago
- MODBUS Penetration Testing Framework☆11Mar 27, 2019Updated 7 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Jan 8, 2024Updated 2 years ago
- Clojure library that abstracts libsodium's NaCl primitives (curve25519, ed25519, blake2b, box/unbox, sign/verify, etc.)☆10Jul 4, 2016Updated 9 years ago