Malware vulnerability intel tool for third-party attackers
☆122Oct 24, 2024Updated last year
Alternatives and similar repositories for Adversary3
Users that are interested in Adversary3 are comparing it to the libraries listed below
Sorting:
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆25Jan 19, 2026Updated last month
- An injector that use PT_LOAD technique☆12Nov 27, 2022Updated 3 years ago
- Reference list for my Ransomware exploitation research. Lists current DLLs I have seen to date that some ransomware search for, which I h…☆11Jul 16, 2022Updated 3 years ago
- Analyzing AD domains for security risks related to user accounts☆64Nov 11, 2022Updated 3 years ago
- ☆12Jun 22, 2022Updated 3 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆36Jan 20, 2022Updated 4 years ago
- ☆28Mar 29, 2022Updated 3 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆103May 11, 2022Updated 3 years ago
- Core module for Forgiva Enterprise connecting Forgiva Server to Forgiva Webclient.☆13Mar 28, 2022Updated 3 years ago
- ☆19Dec 12, 2023Updated 2 years ago
- ☆71Oct 31, 2023Updated 2 years ago
- Tiny keylogger for Win XP/Vista/7/8 with ftp upload.☆14Apr 17, 2022Updated 3 years ago
- ☆20May 30, 2025Updated 9 months ago
- A collection of tools adversaries commonly use in an attack.☆14Nov 23, 2024Updated last year
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆348Oct 22, 2024Updated last year
- Red Teaming & Active Directory Cheat Sheet.☆41Sep 21, 2023Updated 2 years ago
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strike☆51Jun 18, 2022Updated 3 years ago
- A resource for leveraging Windows and Sysmon event codes in threat hunting and incident response.☆25Sep 29, 2024Updated last year
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆18May 23, 2022Updated 3 years ago
- Repository and archive for Killing The Bear Gitbook☆83Aug 15, 2023Updated 2 years ago
- A PoC implementation for an evasion technique to terminate the current thread and restore it before resuming execution, while implementin…☆535Aug 1, 2022Updated 3 years ago
- 1/ An0nymousF0x-V4 2/ DorkBull 3/ JEX_V5 4/ JaguarV3 5/ Mass Bing Grab sites 6/ NekoBot 7/ PayloadV3 8/ Raiz0w0rm 9/ Vipe…☆41May 18, 2022Updated 3 years ago
- Python library for dissecting and parsing Cobalt Strike related data such as Beacon payloads and Malleable C2 Profiles☆186Jun 23, 2025Updated 8 months ago
- ☆151Jun 14, 2023Updated 2 years ago
- Web Application for domain name monitoring / alerting☆64Aug 1, 2024Updated last year
- PoC + vulnerability details for CVE-2022-25262 / JetBrains Hub single-click SAML response takeover☆16Jul 5, 2022Updated 3 years ago
- Using plotly to perfom data visualization of ransomware leak site data☆14Feb 15, 2024Updated 2 years ago
- Malkom is an extensible and simple similarity graph generator for malware analysis aimed at helping analysts visualize and cluster sets o…☆17Apr 6, 2023Updated 2 years ago
- ☆215Dec 2, 2025Updated 3 months ago
- ☆48Apr 15, 2022Updated 3 years ago
- Depending on the AV/EPP/EDR creating a Taskschedule Job with a default cradle is often flagged☆89Jul 7, 2022Updated 3 years ago
- KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default…☆1,631Aug 6, 2022Updated 3 years ago
- ☆121Jan 29, 2026Updated last month
- Sandman is a NTP based backdoor for hardened networks.☆815Mar 31, 2024Updated last year
- ☆20Mar 21, 2024Updated last year
- A C2 post-exploitation framework☆484Jan 24, 2024Updated 2 years ago
- ☆31Sep 4, 2023Updated 2 years ago
- Yet another Ransomware gang tracker☆562Feb 24, 2026Updated last week
- Event Masker is a Splunk streaming command to mask event from search based on a list of rules that contain conditions.☆16Oct 11, 2022Updated 3 years ago