hexa-decim8 / girltalkLinks
A tool for standing up headless C2 for droppables.
☆17Updated 4 months ago
Alternatives and similar repositories for girltalk
Users that are interested in girltalk are comparing it to the libraries listed below
Sorting:
- ☆74Updated 4 years ago
- Writeup for the DEF CON 30 badge challenge☆72Updated 3 years ago
- Open-Source PowerShell module to allow online play of Backdoors & Breaches card game devised by Black Hills Information Security☆56Updated 4 years ago
- Startup project to create a simple to deploy honey pot style detection tool for alerting on common network attacks☆41Updated 4 years ago
- This repository is for the vagrant instances of VulnHub machines☆47Updated 11 months ago
- A curated list of Awesome Threat Intelligence resources☆47Updated 7 years ago
- Passive OS detection based on SYN packets without Transmitting any Data☆47Updated 2 years ago
- ☆72Updated 2 years ago
- Purple Teaming Attack & Hunt Lab - Terraform☆160Updated 3 years ago
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆155Updated 3 years ago
- ☆175Updated this week
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆204Updated 3 years ago
- This repository contains procedures found in the Feb 2022 conti leaks. They were taken from the "manual_teams_c" rocketchat channel in th…☆87Updated 3 years ago
- Defensive Origins Training Schedule☆38Updated last year
- Identifies physical locations where a laptop has been based upon wireless profiles and wireless data recorded in event logs☆93Updated 4 years ago
- Corelight@Home script☆43Updated last year
- Powershell - web traffic whitenoise generator☆47Updated 5 years ago
- ☆12Updated 3 years ago
- Blueteam operational triage registry hunting/forensic tool.☆149Updated this week
- ☆159Updated 2 weeks ago
- Cypher for Defenders: Leveraging Bloodhound Data Beyond the UI☆25Updated last year
- Python utility to generate filesystem content for Obsidian.☆86Updated 2 years ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆68Updated 3 weeks ago
- ☆134Updated 4 years ago
- A Python package is used to execute Atomic Red Team tests (Atomics) across multiple operating system environments.☆135Updated last year
- Hashes for vulnerable LOG4J versions☆154Updated 3 years ago
- Sets up all the layers needed to log in over ssh with ssh keys☆17Updated last month
- ☆39Updated 4 years ago
- Internal network honeypot for detecting if an attacker or insider threat scans your network for log4j CVE-2021-44228☆151Updated 3 years ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆132Updated 3 years ago