jurelou / epagneul
Graph Visualization for windows event logs
☆234Updated 3 weeks ago
Alternatives and similar repositories for epagneul:
Users that are interested in epagneul are comparing it to the libraries listed below
- ☆447Updated 3 years ago
- An open-source Secure Email Gateway (SEG) evaluation toolkit designed for red-teamers.☆474Updated last year
- Code and yara rules to detect and analyze Cobalt Strike☆266Updated 3 years ago
- Tool based on CobaltStrikeParser from SentinelOne which can be used to spam a CobaltStrike server with fake beacons☆367Updated 3 years ago
- ☆659Updated 3 years ago
- Incident Response - Fast suspicious file finder☆237Updated 2 years ago
- Hunts out CobaltStrike beacons and logs operator command output☆904Updated 5 months ago
- Evtx to Splunk ingestor☆15Updated 2 years ago
- A repository that maps commonly used attacks using MSRPC protocols to ATT&CK☆320Updated last year
- Active C2 IoCs☆97Updated 2 years ago
- Detect and respond to Cobalt Strike beacons using ETW.☆486Updated 2 years ago
- WMEye is a post exploitation tool that uses WMI Event Filter and MSBuild Execution for lateral movement☆362Updated 3 years ago
- Scan installed EDRs and AVs on Windows☆575Updated last year
- Scan files or process memory for CobaltStrike beacons and parse their configuration☆907Updated 3 years ago
- PoC script that shows RCE vulnerability over Intellian Satellite controller☆73Updated 2 years ago
- Persistence by writing/reading shellcode from Event Log☆370Updated 2 years ago
- ☆533Updated last year
- Open-Source Vulnerability Intelligence Center - Unified source of vulnerability, exploit and threat Intelligence feeds☆126Updated this week
- LD_PRELOAD Rootkit☆210Updated last year
- Setup scripts for my Malware Analysis VMs☆250Updated 2 years ago
- Zuthaka is an open source application designed to assist red-teaming efforts, by simplifying the task of managing different APTs and othe…☆175Updated 2 years ago
- MAL-CL (Malicious Command-Line)☆309Updated 2 years ago
- Resources About Cobalt Strike. 100+ Tools And 200+ Posts.☆248Updated 4 years ago
- Project for identifying executables that have command-line options that can be obfuscated, possibly bypassing detection rules.☆142Updated last week
- A password guessing tool that targets the Kerberos and LDAP services within the Windows Active Directory environment.☆437Updated last year
- ☆130Updated last year
- ☆1,043Updated last year
- Azure Outlook Command & Control (C2) - Remotely control a compromised Windows Device from your Outlook mailbox. Threat Emulation Tool for…☆470Updated last year
- Automatically created C2 Feeds☆574Updated this week
- Amplify network visibility from multiple POV of other hosts☆302Updated 9 months ago