humanaoffsec / raccoon-infostealer-emulation
Recreation of most of the Raccoon Infostealer's functionality, true to threat intelligence, for safe testing in organizational environments
☆17Updated last year
Alternatives and similar repositories for raccoon-infostealer-emulation:
Users that are interested in raccoon-infostealer-emulation are comparing it to the libraries listed below
- ☆15Updated 5 months ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- runs sliver command on all hosts, partially based on example in sliver repo☆12Updated 11 months ago
- Tools for offensive security of NetBackup infrastructures☆39Updated last year
- Nemesis agent for Mythic☆26Updated 6 months ago
- ☆30Updated 2 years ago
- A collection of sample code used in some experiments with Sliver C2☆13Updated last year
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆42Updated 4 months ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆22Updated 3 years ago
- Bloodhound agent for Mythic☆16Updated 6 months ago
- ☆15Updated 2 years ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆30Updated this week
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆10Updated last year
- fully async implementation of Dirkjan's ROADTools☆31Updated last year
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆51Updated 4 months ago
- An easy way to convert BloodHound output files into data that can be imported into reporting software like Dradis and Plextrac. Built by …☆18Updated 4 years ago
- A proof-of-concept shellcode loader that leverages AI/ML face recognition models to verify the identity of a user on a target system☆36Updated 4 months ago
- Python tool to find vulnerable AD object and generating csv report☆14Updated 2 years ago
- A fast wordlist to nthash converter☆21Updated 3 years ago
- ☆15Updated 3 months ago
- Command and Control that uses NTP as the transport protocol.☆21Updated 3 years ago
- Mythic C2 wrapper for NimSyscallPacker☆23Updated this week
- Ansible role that Installs Mythic☆14Updated 8 months ago
- Leverages B64 chunks to split files and save to clipboard☆25Updated 8 months ago
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆20Updated 10 months ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆37Updated 3 years ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Updated 10 months ago
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆35Updated last month
- self-hosted Azure OSINT tool☆26Updated 6 months ago