Malware vulnerability intel tool for third-party attackers
☆122Oct 24, 2024Updated last year
Alternatives and similar repositories for Adversary3
Users that are interested in Adversary3 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆25Jan 19, 2026Updated 2 months ago
- Reference list for my Ransomware exploitation research. Lists current DLLs I have seen to date that some ransomware search for, which I h…☆11Jul 16, 2022Updated 3 years ago
- An injector that use PT_LOAD technique☆12Nov 27, 2022Updated 3 years ago
- PoC + vulnerability details for CVE-2022-25262 / JetBrains Hub single-click SAML response takeover☆16Jul 5, 2022Updated 3 years ago
- ☆12Jun 22, 2022Updated 3 years ago
- 1/ An0nymousF0x-V4 2/ DorkBull 3/ JEX_V5 4/ JaguarV3 5/ Mass Bing Grab sites 6/ NekoBot 7/ PayloadV3 8/ Raiz0w0rm 9/ Vipe…☆41May 18, 2022Updated 3 years ago
- Analyzing AD domains for security risks related to user accounts☆64Nov 11, 2022Updated 3 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆36Jan 20, 2022Updated 4 years ago
- Hive v5 file decryption algorithm☆34Nov 28, 2022Updated 3 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆102May 11, 2022Updated 3 years ago
- Repository and archive for Killing The Bear Gitbook☆83Aug 15, 2023Updated 2 years ago
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strike☆51Jun 18, 2022Updated 3 years ago
- Case for CVE-2022-30778☆23Aug 23, 2022Updated 3 years ago
- An Improved Proof of Concept for CVE-2022-1388 w/ an Interactive Shell☆14May 25, 2025Updated 9 months ago
- Depending on the AV/EPP/EDR creating a Taskschedule Job with a default cradle is often flagged☆89Jul 7, 2022Updated 3 years ago
- Windows TCPIP Finger Command / C2 Channel and Bypassing Security Software☆67Sep 4, 2023Updated 2 years ago
- Python library for dissecting and parsing Cobalt Strike related data such as Beacon payloads and Malleable C2 Profiles☆187Mar 17, 2026Updated last week
- Simple script realizado en bash, para revisión de múltiples hosts para CVE-2022-1388 (F5)☆25May 5, 2022Updated 3 years ago
- ☆28Mar 29, 2022Updated 3 years ago
- ☆152Jun 14, 2023Updated 2 years ago
- ☆121Updated this week
- Web Application for domain name monitoring / alerting☆65Aug 1, 2024Updated last year
- Contains Actual Events and Codes of Threat Groups, APTs, Research Groups☆19Sep 10, 2022Updated 3 years ago
- ☆71Oct 31, 2023Updated 2 years ago
- ☆145Oct 31, 2023Updated 2 years ago
- KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default…☆1,634Aug 6, 2022Updated 3 years ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,374Oct 27, 2023Updated 2 years ago
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆351Oct 22, 2024Updated last year
- A collection of tools adversaries commonly use in an attack.☆15Nov 23, 2024Updated last year
- privilege escalation POCs built in Rust.☆19Jun 30, 2022Updated 3 years ago
- PoC for CVE-2022-1388_F5_BIG-IP☆58May 15, 2022Updated 3 years ago
- A collection of YARA signatures that I have found around the web.☆11Apr 29, 2016Updated 9 years ago
- Standardized Malware Analysis Tool☆56Mar 9, 2021Updated 5 years ago
- Paracosme is a zero-click remote memory corruption exploit that compromises ICONICS Genesis64 which was demonstrated successfully on stag…☆90Oct 8, 2023Updated 2 years ago
- CORPINT - Corporate / Business Intelligence☆58Aug 22, 2025Updated 7 months ago
- ☆19Dec 12, 2023Updated 2 years ago
- A C2 post-exploitation framework☆486Jan 24, 2024Updated 2 years ago
- Sandman is a NTP based backdoor for hardened networks.☆817Mar 31, 2024Updated last year
- Red Teaming & Active Directory Cheat Sheet.☆41Sep 21, 2023Updated 2 years ago