lexfo / stealer-parser
Information stealer logs parser
☆51Updated 6 months ago
Alternatives and similar repositories for stealer-parser:
Users that are interested in stealer-parser are comparing it to the libraries listed below
- Repo for all my exploits/PoCs☆37Updated this week
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆48Updated 3 months ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆60Updated 6 months ago
- ☆58Updated 4 months ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆114Updated last year
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆109Updated 3 months ago
- A Slack bot phishing framework for Red Teaming exercises☆164Updated 9 months ago
- List of MurmurHash3 favicon hashes of widely used technologies by vendor to search with Shodan.☆22Updated 10 months ago
- ☆36Updated 10 months ago
- MSSprinkler is a password spraying utility for organizations to test their Microsoft Online accounts from an external perspective. It emp…☆74Updated 2 months ago
- ☆34Updated last month
- The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP syst…☆47Updated 9 months ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated 11 months ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆93Updated last year
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆63Updated last year
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆39Updated last year
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Updated last year
- MacOS SX (Stealer) Free 🕵️♂️💻(Passwords, cookies, Google Auth, History) Grabber 📤(uploadcare API for exfiltration)☆23Updated last month
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆21Updated 3 months ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated 9 months ago
- A Moodle Scanner☆39Updated 3 months ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆74Updated last year
- One line command and control backdoors for APIs and web applications.☆50Updated 10 months ago
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious process☆65Updated 9 months ago
- ☆18Updated 4 months ago
- Make an Linux Kernel rootkit visible again.☆47Updated last month
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆47Updated this week
- Advanced Email Threat Hunting w/ Detection as Code☆49Updated 2 weeks ago