kyle-phillips / adversarial-toolsLinks
A collection of tools adversaries commonly use in an attack.
☆14Updated last year
Alternatives and similar repositories for adversarial-tools
Users that are interested in adversarial-tools are comparing it to the libraries listed below
Sorting:
- Pure Honeypots with an automated bash script☆21Updated 4 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Updated 4 years ago
- Standardizing Security Titles☆13Updated last week
- ☆15Updated 4 years ago
- Free Email Providers☆11Updated 2 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Updated 4 years ago
- Work in Progress repo☆15Updated 6 years ago
- Small utility script to notify via Slack about Hashcat's progress during a password cracking session☆10Updated 6 years ago
- Malware campaigns and APTs research by BlackArrow☆19Updated 5 years ago
- just manipulatin these here tokens yes sir nothing weird☆22Updated 3 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 6 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆25Updated last year
- Kibana app for RedELK☆18Updated 2 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆35Updated 3 years ago
- ☆22Updated 5 years ago
- Data EXfiltration TestER☆21Updated 6 years ago
- wordlists for password cracking☆28Updated 3 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆32Updated 9 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆51Updated 5 years ago
- HoneyDB Python Module☆14Updated last year
- Active Directory information dumper via LDAP☆13Updated 5 years ago
- Repository for LNK stuff☆31Updated 3 years ago
- ☆42Updated 9 months ago
- ☆33Updated 11 months ago
- buffer overflow examples☆23Updated 8 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆25Updated 3 years ago
- The long shadow to emerge as other Git repositories☆18Updated last year
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆21Updated 4 years ago
- A Canary which fires when uninstalled☆34Updated 4 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆12Updated 4 years ago