jantonakos / ThreatHuntingExcursions
Code, commands, and chatter about Threat Hunting.
☆34Updated 5 years ago
Alternatives and similar repositories for ThreatHuntingExcursions:
Users that are interested in ThreatHuntingExcursions are comparing it to the libraries listed below
- ☆20Updated last year
- Scan web server for known webshell names and responses☆50Updated 8 years ago
- Projects and POCs☆59Updated 10 years ago
- ☆46Updated 7 years ago
- Spray SMB with hashes, Then psexec☆32Updated 5 years ago
- ☆27Updated 8 years ago
- Decrypt MITM SSL RDP and save to pcap☆53Updated 10 years ago
- Yet Another SMB PSEXEC (Y.A.S.P) Tool☆21Updated 11 years ago
- Based on the Volatility framework, this script will run various plugins as well as create a timeline, or use YARA/ClamAV/VirusTotal to fi…☆49Updated 7 years ago
- Script to extract malicious payload and decoy document from CVE-2015-1641 exploit documents☆23Updated 8 years ago
- ☆58Updated 7 years ago
- PowerShell module for the exploitation and testing☆16Updated 9 years ago
- Mixing up CVE and MS like a pro☆24Updated 7 years ago
- Python scripts to parse scans.io ssl data and ingest into elasticsearch for searching☆33Updated 8 years ago
- Comprehensive Pivoting Framework☆20Updated 8 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 9 years ago
- ☆47Updated 9 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- C# code for Transferring Backdoor Payloads by ICMPv4 Traffic and bypassing Anti-Viruses☆29Updated last year
- EmPyre Web Interface☆12Updated 7 years ago
- Slides from previous conference talks☆41Updated 7 years ago