Win32 utility for auditing TCP connections
☆56Aug 25, 2020Updated 5 years ago
Alternatives and similar repositories for TCPHound
Users that are interested in TCPHound are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A DIY project to show failed ssh login attempts on a map in real-time☆11Apr 22, 2025Updated 11 months ago
- ☆18Sep 14, 2023Updated 2 years ago
- Deception implementation through analysis of BloodHound data☆55Oct 9, 2025Updated 5 months ago
- You can access the sigma rules to detect malicious activities. It is organized by Mitre Att&ck categories.☆13Feb 7, 2022Updated 4 years ago
- 802.15.4 Fuzzer☆21Mar 25, 2019Updated 6 years ago
- ☆15Oct 24, 2017Updated 8 years ago
- Pentest scripts for abuse Bash on Windows (Cygwin/WSL) - HackLu 2018☆45May 29, 2019Updated 6 years ago
- PAC HTTPS leak demo from DEF CON 24 'Toxic Proxies' talk☆30Oct 4, 2016Updated 9 years ago
- Resilient Automation Functions and Scripts☆15Jan 5, 2022Updated 4 years ago
- A simple tool to view important DLL Characteristics and change DEP and ASLR☆45Oct 26, 2018Updated 7 years ago
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆621Oct 6, 2025Updated 5 months ago
- A collection of tools adversaries commonly use in an attack.☆14Nov 23, 2024Updated last year
- Presentation materials for talks I've given.☆20Oct 14, 2019Updated 6 years ago
- POC code to crash Windows Event Logger Service☆27Oct 16, 2020Updated 5 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- Fuzzer for finding Open Mail Relays☆14Oct 21, 2020Updated 5 years ago
- Automatic updater plugin for x64dbg☆24Jul 5, 2025Updated 8 months ago
- Mario & Luigi - Tools for sniffing Windows Named Pipes communication☆129Nov 15, 2016Updated 9 years ago
- PoC for CVE-2019-0888 - Use-After-Free in Windows ActiveX Data Objects (ADO)☆40Jul 9, 2019Updated 6 years ago
- Detect possible sysmon logging bypasses given a specific configuration☆111Dec 26, 2018Updated 7 years ago
- ☆265Oct 25, 2025Updated 4 months ago
- ☆30Apr 24, 2019Updated 6 years ago
- File downloader with SSL support and progress bar☆19Sep 14, 2017Updated 8 years ago
- A fork of https://github.com/SafeBreach-Labs/pinjectra with a practical implementation of Stack Bombing☆29Oct 22, 2020Updated 5 years ago
- Remotely collect linux live forensics artifacts.☆14Jul 8, 2022Updated 3 years ago
- Osquery Packs we use for customer security hardening☆12Jun 30, 2025Updated 8 months ago
- Extracts Azure authentication tokens from PowerShell process minidumps.☆25May 20, 2023Updated 2 years ago
- Some YARA rules i will add from time to time☆12May 31, 2019Updated 6 years ago
- Digital forensic acquisition tool for Windows based incident response.☆347May 7, 2024Updated last year
- Proof of concept communications from C# via a web browser process☆21Feb 15, 2019Updated 7 years ago
- Crackme challenge☆17Nov 20, 2020Updated 5 years ago
- ☆349Mar 19, 2021Updated 5 years ago
- A Pure BusyBox APK mirror selector for Alpine Linux☆10Oct 6, 2022Updated 3 years ago
- A PoC~ish of https://elastic.github.io/security-research/malware/2022/01/01.operation-bleeding-bear/article/☆31Feb 26, 2024Updated 2 years ago
- Historical Observations of Actionable Reputation Data☆13Jun 26, 2018Updated 7 years ago
- Web app for tracking speedrunning times and personal bests.☆17Sep 18, 2021Updated 4 years ago
- All sysmon event types and their fields explained☆566Nov 13, 2021Updated 4 years ago
- Firefox Addon: Record your computer or device screen and annotate it with your voice and webcam.☆10Jul 26, 2016Updated 9 years ago
- A small, unfinished utility to browse and download NirSoft programs.☆17Jun 14, 2020Updated 5 years ago