lesnuages / snitch
Monitor malware scanning services for your payloads
☆11Updated 3 years ago
Alternatives and similar repositories for snitch
Users that are interested in snitch are comparing it to the libraries listed below
Sorting:
- Exactly what it sounds like, which is something rad☆22Updated 2 years ago
- A tool to sync mythic events with ghostwriter oplog.☆13Updated 5 months ago
- Some Pentesting Scripts☆11Updated 3 years ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆22Updated 3 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- Standardizing Security Titles☆13Updated 2 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Updated 2 years ago
- ☆11Updated 4 years ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆12Updated last year
- Automated tool for setting up KingPhisher☆9Updated 4 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 5 months ago
- Kibana app for RedELK☆17Updated 2 years ago
- Tricard - Malware Sandbox Fingerprinting☆20Updated last year
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online ma…☆13Updated 4 years ago
- Active Directory Password Spray Testing Utility in Go☆17Updated last year
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Updated last year
- ☆18Updated last year
- ☆12Updated 4 years ago
- parsers to make life easier☆13Updated 4 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Updated 4 years ago
- Automated Payload Test Controller☆10Updated 7 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- ☆14Updated 3 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 5 years ago
- SSDP Service Discovery☆17Updated 6 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆9Updated 2 years ago
- Apfell implant written in C#.☆8Updated 4 years ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated 2 years ago
- A 'trainer' agent which is great for showing customers a nice fake 'ransom' screen. Requires target machine to have head - since support …☆11Updated last year
- ☆18Updated 4 years ago