Win32 utility for auditing TCP connections
☆56Aug 25, 2020Updated 5 years ago
Alternatives and similar repositories for TCPHound
Users that are interested in TCPHound are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A DIY project to show failed ssh login attempts on a map in real-time☆11Apr 22, 2025Updated last year
- ☆18Sep 14, 2023Updated 2 years ago
- You can access the sigma rules to detect malicious activities. It is organized by Mitre Att&ck categories.☆13Feb 7, 2022Updated 4 years ago
- 802.15.4 Fuzzer☆21Mar 25, 2019Updated 7 years ago
- ☆15Oct 24, 2017Updated 8 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Pentest scripts for abuse Bash on Windows (Cygwin/WSL) - HackLu 2018☆45May 29, 2019Updated 6 years ago
- PAC HTTPS leak demo from DEF CON 24 'Toxic Proxies' talk☆30Oct 4, 2016Updated 9 years ago
- Resilient Automation Functions and Scripts☆15Jan 5, 2022Updated 4 years ago
- A simple tool to view important DLL Characteristics and change DEP and ASLR☆45Oct 26, 2018Updated 7 years ago
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆620Oct 6, 2025Updated 7 months ago
- A collection of tools adversaries commonly use in an attack.☆15Nov 23, 2024Updated last year
- Presentation materials for talks I've given.☆20Oct 14, 2019Updated 6 years ago
- POC code to crash Windows Event Logger Service☆27Oct 16, 2020Updated 5 years ago
- Fuzzer for finding Open Mail Relays☆14Updated this week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Automatic updater plugin for x64dbg☆24Jul 5, 2025Updated 10 months ago
- Mario & Luigi - Tools for sniffing Windows Named Pipes communication☆129Nov 15, 2016Updated 9 years ago
- PoC for CVE-2019-0888 - Use-After-Free in Windows ActiveX Data Objects (ADO)☆39Jul 9, 2019Updated 6 years ago
- C++ Windows Reverse Shell - Universal DLL Hijack | SSL Encryption | Statically Linked☆91Mar 29, 2020Updated 6 years ago
- Detect possible sysmon logging bypasses given a specific configuration☆111Dec 26, 2018Updated 7 years ago
- ☆266Oct 25, 2025Updated 6 months ago
- ☆30Apr 24, 2019Updated 7 years ago
- File downloader with SSL support and progress bar☆19Sep 14, 2017Updated 8 years ago
- A fork of https://github.com/SafeBreach-Labs/pinjectra with a practical implementation of Stack Bombing☆28Oct 22, 2020Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Remotely collect linux live forensics artifacts.☆14Jul 8, 2022Updated 3 years ago
- Osquery Packs we use for customer security hardening☆12Jun 30, 2025Updated 10 months ago
- Some YARA rules i will add from time to time☆12May 31, 2019Updated 6 years ago
- Extracts Azure authentication tokens from PowerShell process minidumps.☆25May 20, 2023Updated 3 years ago
- Digital forensic acquisition tool for Windows based incident response.☆348May 7, 2024Updated 2 years ago
- Proof of concept communications from C# via a web browser process☆21Feb 15, 2019Updated 7 years ago
- Crackme challenge☆17Nov 20, 2020Updated 5 years ago
- ☆350Mar 19, 2021Updated 5 years ago
- A PoC~ish of https://elastic.github.io/security-research/malware/2022/01/01.operation-bleeding-bear/article/☆31Feb 26, 2024Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Historical Observations of Actionable Reputation Data☆13Jun 26, 2018Updated 7 years ago
- All sysmon event types and their fields explained☆568Nov 13, 2021Updated 4 years ago
- Firefox Addon: Record your computer or device screen and annotate it with your voice and webcam.☆10Jul 26, 2016Updated 9 years ago
- My solutions for random crackmes and other challenges☆12Dec 23, 2019Updated 6 years ago
- Reproducing the SkeletonKey malware.☆11Apr 6, 2024Updated 2 years ago
- ☆102Jul 18, 2019Updated 6 years ago
- C# Targeted Attack Reconnissance Tools☆120Jan 11, 2021Updated 5 years ago