jurelou / epagneulLinks
Graph Visualization for windows event logs
☆242Updated 8 months ago
Alternatives and similar repositories for epagneul
Users that are interested in epagneul are comparing it to the libraries listed below
Sorting:
- ☆453Updated 4 years ago
- An open-source Secure Email Gateway (SEG) evaluation toolkit designed for red-teamers.☆501Updated 2 years ago
- Code and yara rules to detect and analyze Cobalt Strike☆271Updated 4 years ago
- Tool based on CobaltStrikeParser from SentinelOne which can be used to spam a CobaltStrike server with fake beacons☆372Updated 4 years ago
- A repository that maps commonly used attacks using MSRPC protocols to ATT&CK☆336Updated 2 years ago
- Evtx to Splunk ingestor☆15Updated 3 years ago
- Scan installed EDRs and AVs on Windows☆594Updated 3 months ago
- Incident Response - Fast suspicious file finder☆244Updated 3 years ago
- Amplify network visibility from multiple POV of other hosts☆305Updated last year
- Detect and respond to Cobalt Strike beacons using ETW.☆508Updated 3 years ago
- Open Dataset of Cobalt Strike Beacon metadata (2018-2022)☆125Updated 3 years ago
- Hunts out CobaltStrike beacons and logs operator command output☆943Updated last year
- POC for CVE-2022-1388☆232Updated 3 years ago
- PoC script that shows RCE vulnerability over Intellian Satellite controller☆73Updated 3 years ago
- ☆552Updated last year
- RdpCacheStitcher is a tool that supports forensic analysts in reconstructing useful images out of RDP cache bitmaps.☆289Updated 2 years ago
- Python library for dissecting and parsing Cobalt Strike related data such as Beacon payloads and Malleable C2 Profiles☆177Updated 3 months ago
- Cobalt Strike Beacon configuration extractor and parser.☆156Updated 4 years ago
- Deobfuscate Log4Shell payloads with ease.☆164Updated 3 years ago
- Scan files or process memory for CobaltStrike beacons and parse their configuration☆918Updated 4 years ago
- ☆667Updated 3 years ago
- A little tool to play with Outlook☆207Updated 3 years ago
- WMEye is a post exploitation tool that uses WMI Event Filter and MSBuild Execution for lateral movement☆369Updated 3 years ago
- ProxyLogon Pre-Auth SSRF To Arbitrary File Write☆124Updated last year
- Parses amcache.hve files, but with a twist!☆142Updated 8 months ago
- Persistence by writing/reading shellcode from Event Log☆377Updated 3 years ago
- A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object☆170Updated 2 years ago
- POC CVE-2022-30190 : CVE 0-day MS Offic RCE aka msdt follina☆159Updated 3 years ago
- CVE-2021-1675 Detection Info☆215Updated 2 years ago
- An All-In-One Pure Python PoC for CVE-2021-44228☆178Updated 3 years ago