lesnuages / snitch
Monitor malware scanning services for your payloads
☆10Updated 3 years ago
Alternatives and similar repositories for snitch:
Users that are interested in snitch are comparing it to the libraries listed below
- A tool to sync mythic events with ghostwriter oplog.☆12Updated 2 months ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆14Updated last year
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- Tricard - Malware Sandbox Fingerprinting☆19Updated last year
- Kibana app for RedELK☆16Updated last year
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆13Updated 2 years ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆22Updated 3 years ago
- parsers to make life easier☆12Updated 4 years ago
- Exactly what it sounds like, which is something rad☆20Updated 2 years ago
- SSDP Service Discovery☆16Updated 6 years ago
- Standardizing Security Titles☆13Updated 2 years ago
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Updated 3 years ago
- Apfell implant written in C#.☆8Updated 4 years ago
- Active Directory Password Spray Testing Utility in Go☆14Updated 10 months ago
- Do the unexpected with AD GPO processing☆9Updated 5 years ago
- Phishing sites configured to work with Netlify form handling☆12Updated 5 years ago
- Automated Payload Test Controller☆9Updated 7 years ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆12Updated last year
- python3 scripts to help with aws triage needs☆15Updated 2 years ago
- ☆17Updated last year
- just manipulatin these here tokens yes sir nothing weird☆22Updated 2 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 4 years ago
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆18Updated 3 years ago
- ☆15Updated 3 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Updated 4 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 2 months ago
- 3gsocks - a reverse connection socks5 based network pivot☆9Updated 3 years ago
- Parser for Windows PowerShell script block logs☆13Updated last month
- Apply a filter to the events being reported by windows event logging☆15Updated 4 years ago