jurelou / epagneulLinks
Graph Visualization for windows event logs
☆242Updated last year
Alternatives and similar repositories for epagneul
Users that are interested in epagneul are comparing it to the libraries listed below
Sorting:
- An open-source Secure Email Gateway (SEG) evaluation toolkit designed for red-teamers.☆512Updated 2 years ago
- ☆452Updated 4 years ago
- Tool based on CobaltStrikeParser from SentinelOne which can be used to spam a CobaltStrike server with fake beacons☆370Updated 4 months ago
- Code and yara rules to detect and analyze Cobalt Strike☆273Updated 4 years ago
- A repository that maps commonly used attacks using MSRPC protocols to ATT&CK☆343Updated 2 years ago
- Incident Response - Fast suspicious file finder☆249Updated 2 weeks ago
- Amplify network visibility from multiple POV of other hosts☆308Updated last year
- Persistence by writing/reading shellcode from Event Log☆378Updated 3 years ago
- Zuthaka is an open source application designed to assist red-teaming efforts, by simplifying the task of managing different APTs and othe…☆178Updated 3 years ago
- Cobalt Strike Aggressor Script that Performs System/AV/EDR Recon☆345Updated 3 years ago
- Scan installed EDRs and AVs on Windows☆604Updated 2 months ago
- ☆670Updated 4 years ago
- Python implementation for CVE-2021-42278 (Active Directory Privilege Escalation)☆277Updated 4 years ago
- Detect and respond to Cobalt Strike beacons using ETW.☆520Updated 3 years ago
- WMEye is a post exploitation tool that uses WMI Event Filter and MSBuild Execution for lateral movement☆369Updated 4 years ago
- ☆298Updated last year
- Python library for dissecting and parsing Cobalt Strike related data such as Beacon payloads and Malleable C2 Profiles☆185Updated 7 months ago
- Azure Outlook Command & Control (C2) - Remotely control a compromised Windows Device from your Outlook mailbox. Threat Emulation Tool for…☆503Updated 2 years ago
- Hunts out CobaltStrike beacons and logs operator command output☆951Updated last year
- Run Powershell without software restrictions.☆282Updated 4 years ago
- A little tool to play with Outlook☆207Updated 4 years ago
- Setup scripts for my Malware Analysis VMs☆261Updated 3 years ago
- Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation☆214Updated 4 years ago
- Evtx to Splunk ingestor☆16Updated 3 years ago
- Project for identifying executables that have command-line options that can be obfuscated, possibly bypassing detection rules.☆182Updated last year
- ☆553Updated 2 years ago
- Deobfuscate Log4Shell payloads with ease.☆170Updated 3 years ago
- POC for CVE-2022-1388☆231Updated 3 years ago
- Excel Macro Document Reader/Writer for Red Teamers & Analysts☆524Updated 4 years ago
- We developed GRAT2 Command & Control (C2) project for learning purpose.☆413Updated 5 years ago