iomoath / web-log-analyzer
Web access logs analyzer - provides an insight on how remote hosts behave
☆15Updated 3 years ago
Alternatives and similar repositories for web-log-analyzer:
Users that are interested in web-log-analyzer are comparing it to the libraries listed below
- Execute embedded Mimikatz☆13Updated 3 years ago
- Windows File Enumeration Intel Gathering Tool.☆17Updated last year
- Converts JBoss/Wildfly management users properties file to hashcat format compatible with mode 20☆12Updated 4 years ago
- Log converter from CS log to Ghostwriter CSV☆29Updated 4 years ago
- Exactly what it sounds like, which is something rad☆21Updated 2 years ago
- Simple C2 over the Trello API☆38Updated 2 years ago
- I used this to see if an EDR is running in Safe Mode☆35Updated 4 years ago
- A compilation of Aggressor/Sleep scripts for operational purposes that I've made.☆11Updated 3 years ago
- LibreHealth v2.0.0 suffers from an authenticated file upload vulnerability allowing remote attackers to gain remote code execution (RCE) …☆13Updated 4 years ago
- ☆15Updated 3 years ago
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxes☆12Updated 3 years ago
- ☆17Updated 4 years ago
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆18Updated 3 years ago
- Execute Mimikatz with different technique☆51Updated 3 years ago
- Run PowerShell command without invoking powershell.exe☆35Updated 3 years ago
- Searching .evtx logs for remote connections☆23Updated last year
- Perform Windows domain enumeration via LDAP☆36Updated 2 years ago
- ☆20Updated 4 years ago
- Convert Empire profiles to Apache mod_rewrite scripts☆27Updated 5 years ago
- Core bypass Windows Defender and execute any binary converted to shellcode☆43Updated 3 years ago
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆23Updated 2 years ago
- treafik fronted c2 examples☆26Updated 4 years ago
- Check for NotProxyShell CVE-2022-40140 & CVE-2022-41082☆25Updated 2 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆36Updated 5 years ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Updated 2 years ago
- A project to replicate the functionality of Noah Powers' ServerSetup script, but with error handling and fixed Namecheap API support.☆34Updated 3 years ago
- Find world writable directories that contain a .exe or .dll file☆12Updated 3 years ago
- Scripts to automate standing up apache2 with mod_rewrite in front of C2 servers.☆46Updated 4 years ago
- Multi-threaded C2 framework built in Flask with keylogger - from the Offensive C# Course by Naga Sai Nikhil☆21Updated 2 years ago
- all published scripts devloped by ahmed khlief☆20Updated 4 years ago