lacework / lacework-labs
☆18Updated last year
Related projects ⓘ
Alternatives and complementary repositories for lacework-labs
- A collection of tools adversaries commonly use in an attack.☆14Updated last month
- Active Directory Password Spray Testing Utility in Go☆14Updated 7 months ago
- Manticore's Public Threats Repository☆10Updated 4 years ago
- Exploit for win10 SMB3.1☆16Updated 4 years ago
- Pure Honeypots with an automated bash script☆19Updated 3 years ago
- A Swift port of some of the original PersistentJXA projects by D00MFist. Original PersistentJXA repo: https://github.com/D00MFist/Persist…☆30Updated 3 years ago
- Cybersecurity Incidents Mind Maps☆32Updated 3 years ago
- Network Finger Printer☆16Updated 7 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 4 years ago
- ☆15Updated 3 years ago
- Tool for reconnaissance of AWS cloud environments☆13Updated last year
- POC for utilizing wikipedia API for Command and Control☆29Updated last year
- Swift code to programmatically execute local or hosted JXA payloads from Terminal without using the on-disk osascript binary.☆22Updated 3 years ago
- ZAP plugin demonstrating custom view for WebSocket messages.☆13Updated 2 years ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆21Updated 3 years ago
- A rogue DNS detector☆23Updated last year
- A Canary which fires when uninstalled☆34Updated 3 years ago
- JXA script for Mythic that prints the TCC.db☆15Updated 3 years ago
- Eddie Vetter - triage macOS applications for security research☆16Updated 3 years ago
- python3 scripts to help with aws triage needs☆15Updated 2 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Updated 3 years ago
- Exactly what it sounds like, which is something rad☆20Updated 2 years ago
- ☆24Updated 3 years ago
- Catalog Red Team techniques that cause popups in various macOS versions☆14Updated 4 years ago
- Standardizing Security Titles☆13Updated last year
- Scans through registry hives outputting entropy values for key/values, dumps binary contents to files...we are looking for those "fileles…☆11Updated 5 years ago
- Useful Windows and AD tools☆15Updated 2 years ago
- ☆12Updated 3 years ago