l0gan / domainCatView external linksLinks
Check Domain Categorization
☆78Feb 11, 2021Updated 5 years ago
Alternatives and similar repositories for domainCat
Users that are interested in domainCat are comparing it to the libraries listed below
Sorting:
- Quick and dirty dynamic redirect.rules generator☆169Oct 12, 2022Updated 3 years ago
- Assorted, MIT licensed, threat hunting rules from @bradleyjkemp☆14Mar 11, 2022Updated 3 years ago
- terraform deployment for red team☆26Dec 13, 2022Updated 3 years ago
- Auto-generate an HTaccess for payload delivery -- automatically pulls ips/nets/etc from known sandbox companies/sources that have been se…☆170Aug 10, 2020Updated 5 years ago
- ☆27Aug 8, 2021Updated 4 years ago
- Chameleon: A tool for evading Proxy categorisation☆515Nov 28, 2024Updated last year
- Event Data Collector☆40Jan 12, 2026Updated last month
- Ansible role that Installs Mythic☆19Jun 24, 2024Updated last year
- A standalone tool for logging shell commands to GhostWriter automatically☆19Aug 24, 2024Updated last year
- Checks expired domains for categorization/reputation and Archive.org history to determine good candidates for phishing and C2 domain name…☆1,644Jun 6, 2024Updated last year
- Swift code to programmatically execute local or hosted JXA payloads from Terminal without using the on-disk osascript binary.☆23Apr 22, 2021Updated 4 years ago
- (kinda) Malicious Outlook Reader☆19Mar 2, 2021Updated 4 years ago
- ☆22Jun 9, 2025Updated 8 months ago
- A Python tool for ingesting HTML and producing HTML source suitable for phishing campaigns.☆59Jan 18, 2026Updated 3 weeks ago
- Red Team tool for exfiltrating files from a target's Google Drive that you have access to, via Google's API.☆59Sep 2, 2021Updated 4 years ago
- Objective C dylibHijackScanner and analysis tool☆38Jul 12, 2023Updated 2 years ago
- If you have any questions, please open an issue.☆25Apr 6, 2022Updated 3 years ago
- A .NET binary loader that bypasses AMSI☆45Sep 20, 2021Updated 4 years ago
- JXA script to allow programmatic persistence via macOS Calendar.app alerts.☆44Oct 31, 2020Updated 5 years ago
- Strstr with user-supplied needle and filename as a BOF.☆32Sep 27, 2021Updated 4 years ago
- Tools for hunting security threats☆12Feb 4, 2020Updated 6 years ago
- This tool aims at parsing Microsoft Protection logs to provide relevant data to forensic analysts during incident responses.☆21Sep 30, 2022Updated 3 years ago
- A tool to sync mythic events with ghostwriter oplog.☆14Nov 21, 2024Updated last year
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Feb 23, 2022Updated 3 years ago
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 3 years ago
- urlscan.io API wrapper for Ruby☆13Oct 16, 2023Updated 2 years ago
- ☆12Feb 7, 2023Updated 3 years ago
- Search for categorized domain☆453Jan 15, 2019Updated 7 years ago
- Inject Encrypted Commands Into EMF Shapes for C2 In VBA / Office Malware☆39Jul 10, 2020Updated 5 years ago
- easy-to-use payload hosting☆276Apr 22, 2022Updated 3 years ago
- Caesar-Cipher based encryption☆29Mar 1, 2021Updated 4 years ago
- Library of sites for categorization☆28Feb 12, 2019Updated 7 years ago
- Generate droppers with encrypted payloads automatically.☆54Nov 16, 2021Updated 4 years ago
- Use IronPython directly in your code without IronPython DLLs and dependencies☆12Jan 19, 2022Updated 4 years ago
- ☆12Aug 10, 2024Updated last year
- A simple script that edits the XML of a macro-enabled Word document (.docm or Word 97 document) to add a reference to a remote stylesheet…☆11Oct 5, 2022Updated 3 years ago
- ☆26May 22, 2021Updated 4 years ago
- Search for potential frontable domains☆644Mar 22, 2023Updated 2 years ago
- Macro-Enabled Excel File Generator (.xlsm) using the EPPlus Library.☆148Sep 7, 2020Updated 5 years ago