humanaoffsec / raccoon-infostealer-emulation
Recreation of most of the Raccoon Infostealer's functionality, true to threat intelligence, for safe testing in organizational environments
☆16Updated last year
Alternatives and similar repositories for raccoon-infostealer-emulation:
Users that are interested in raccoon-infostealer-emulation are comparing it to the libraries listed below
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆13Updated last month
- Nemesis agent for Mythic☆26Updated 5 months ago
- Tools for offensive security of NetBackup infrastructures☆39Updated last year
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆50Updated 3 months ago
- Python tool to find vulnerable AD object and generating csv report☆14Updated 2 years ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆22Updated 3 years ago
- Continuous kerberoast monitor☆44Updated last year
- runs sliver command on all hosts, partially based on example in sliver repo☆12Updated 10 months ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆54Updated 2 years ago
- ☆15Updated 4 months ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆36Updated 3 years ago
- Bloodhound agent for Mythic☆16Updated 5 months ago
- ☆30Updated 2 years ago
- A collection of sample code used in some experiments with Sliver C2☆13Updated last year
- ☆15Updated 2 years ago
- A Nemesis powered Retrieval-Augmented Generation (RAG) chatbot proof-of-concept.☆59Updated 11 months ago
- Extension functionality for the NightHawk operator client☆26Updated last year
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆21Updated 7 months ago
- Mythic C2 wrapper for NimSyscallPacker☆21Updated 2 months ago
- A proof-of-concept shellcode loader that leverages AI/ML face recognition models to verify the identity of a user on a target system☆36Updated 3 months ago
- The repository accompanying the Buer Emulation workshop☆24Updated 3 years ago
- A fast wordlist to nthash converter☆21Updated 3 years ago
- Golang tool designed to exfiltrate passwords found via the sshd and su services☆9Updated 9 months ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Reverse-HTTP Redirector via DigitalOcean Apps Platform☆28Updated last year
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆29Updated 8 months ago
- ☆12Updated 2 years ago