lexfo / stealer-parserLinks
Information stealer logs parser
☆68Updated 10 months ago
Alternatives and similar repositories for stealer-parser
Users that are interested in stealer-parser are comparing it to the libraries listed below
Sorting:
- Repo for all my exploits/PoCs☆51Updated last month
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆62Updated 10 months ago
- ☆40Updated 6 months ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆120Updated last year
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆51Updated 3 months ago
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆62Updated last week
- ☆63Updated 5 months ago
- Weaponized EvilnoVNC: Scalable and semi-automated MFA-Phishing☆49Updated 3 months ago
- Jasmin ransomware web panel path traversal PoC☆21Updated last year
- ☆59Updated 8 months ago
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.☆110Updated 2 years ago
- quick and dirty proof-of-concept to hide shells in images☆50Updated last year
- A real fake social engineering app☆122Updated last month
- Extracting OSINT Insights from 15TB of GitHub Event Logs☆68Updated last year
- Living Off The Land (LOTL) persistent Reverse shell☆101Updated last year
- A Slack bot phishing framework for Red Teaming exercises☆167Updated last year
- Everything and anything related to password spraying☆141Updated last year
- Vast.ai Password Kracking☆69Updated last week
- Make an Linux Kernel rootkit visible again.☆52Updated 4 months ago
- ☆61Updated last year
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Updated 8 months ago
- Kooky cURL-powered replacement for reverse shell via /dev/tcp☆64Updated last week
- Auto exploitation tool for CVE-2024-24401.☆36Updated 9 months ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆106Updated last year
- ✉️ HTML Smuggling generator&obfuscator for your Red Team operations☆161Updated last year
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆78Updated 9 months ago
- Modular framework for automating triaging, malware analysis, and analyst workflows☆41Updated last month
- Fortinet Fortimanager Unauthenticated Remote Code Execution AKA FortiJump CVE-2024-47575☆88Updated 7 months ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆76Updated 2 years ago