Win32 utility for auditing TCP connections
☆56Aug 25, 2020Updated 5 years ago
Alternatives and similar repositories for TCPHound
Users that are interested in TCPHound are comparing it to the libraries listed below
Sorting:
- A DIY project to show failed ssh login attempts on a map in real-time☆12Apr 22, 2025Updated 10 months ago
- A collection of tools adversaries commonly use in an attack.☆14Nov 23, 2024Updated last year
- ☆18Sep 14, 2023Updated 2 years ago
- PAC HTTPS leak demo from DEF CON 24 'Toxic Proxies' talk☆30Oct 4, 2016Updated 9 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- ☆30Apr 24, 2019Updated 6 years ago
- 802.15.4 Fuzzer☆21Mar 25, 2019Updated 6 years ago
- Remote code execution in Power Platform connectors via JSON deserialization☆23Mar 30, 2023Updated 2 years ago
- ☆10Oct 22, 2017Updated 8 years ago
- Proof of concept communications from C# via a web browser process☆21Feb 15, 2019Updated 7 years ago
- Mario & Luigi - Tools for sniffing Windows Named Pipes communication☆129Nov 15, 2016Updated 9 years ago
- PoC for CVE-2019-0888 - Use-After-Free in Windows ActiveX Data Objects (ADO)☆40Jul 9, 2019Updated 6 years ago
- A simple tool to view important DLL Characteristics and change DEP and ASLR☆45Oct 26, 2018Updated 7 years ago
- Forensics triage tool relying on Volatility and Foremost☆25Dec 3, 2023Updated 2 years ago
- Web app for tracking speedrunning times and personal bests.☆17Sep 18, 2021Updated 4 years ago
- My solutions for random crackmes and other challenges☆12Dec 23, 2019Updated 6 years ago
- Troll the NSA with red flags and free speech! Flagger is a Firefox and Chrome extension that adds words like "Taliban" and "anthrax" into…☆16Aug 21, 2021Updated 4 years ago
- socat version 2☆10Aug 30, 2012Updated 13 years ago
- Three different shellcode techniques on the Windows Kernel☆15Apr 8, 2025Updated 10 months ago
- A fork of https://github.com/SafeBreach-Labs/pinjectra with a practical implementation of Stack Bombing☆29Oct 22, 2020Updated 5 years ago
- ☆11Aug 7, 2021Updated 4 years ago
- Osquery Packs we use for customer security hardening☆12Jun 30, 2025Updated 8 months ago
- Protects and logs suspicious and malicious usage of .NET CSC.exe and Runtime C# Compilation☆25May 3, 2018Updated 7 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37May 15, 2018Updated 7 years ago
- Automatic updater plugin for x64dbg☆24Jul 5, 2025Updated 7 months ago
- Pentest scripts for abuse Bash on Windows (Cygwin/WSL) - HackLu 2018☆45May 29, 2019Updated 6 years ago
- Slides and reference material from Evading Autoruns presentation at DerbyCon 7 (September 2017)☆106Feb 10, 2021Updated 5 years ago
- Swift code to parse the quarantine history database, Chrome history database, Safari history database, and Firefox history database on ma…☆15Dec 3, 2020Updated 5 years ago
- Nitrokey's plugin for KeePass☆12Feb 4, 2019Updated 7 years ago
- Scripts for producing release artefacts and signing, pushing and verifyig them. Note: This is superseded by OpenVPN/openvpn-build.☆11Dec 7, 2022Updated 3 years ago
- Firefox Addon: Record your computer or device screen and annotate it with your voice and webcam.☆10Jul 26, 2016Updated 9 years ago
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆36Dec 9, 2019Updated 6 years ago
- A PoC~ish of https://elastic.github.io/security-research/malware/2022/01/01.operation-bleeding-bear/article/☆31Feb 26, 2024Updated 2 years ago
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆620Oct 6, 2025Updated 4 months ago
- ☆265Oct 25, 2025Updated 4 months ago
- XXE attack tool☆31Feb 20, 2016Updated 10 years ago
- Reproducing the SkeletonKey malware.☆11Apr 6, 2024Updated last year
- Suite for Information gathering☆12Jul 2, 2018Updated 7 years ago
- ☆15Oct 24, 2017Updated 8 years ago