mark-ignacio / bedrLinks
a BPF-based Linux syscall monitor
☆10Updated 5 years ago
Alternatives and similar repositories for bedr
Users that are interested in bedr are comparing it to the libraries listed below
Sorting:
- Scripts to detect Fast-Flux and DGA using DNS query responses☆43Updated 8 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 4 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Updated 5 years ago
- Python parser for Red Canary's Atomic Red Team Yamls☆27Updated 6 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Updated 7 years ago
- Duo MFA auditing tool to test users' likelihood of approving unexpected push notifications☆13Updated 7 years ago
- A CLI tool for querying passive DNS services☆41Updated last year
- FastIR Agent is a Windows service to execute FastIR Collector on demand☆14Updated 8 years ago
- Virustotal Data to Timesketch☆17Updated 6 years ago
- Slides from my AD Privesc talk at WAHCKon 2017☆16Updated 8 years ago
- ☆14Updated 7 years ago
- A Windows REG file to enable all default PowerShell logging on a system with PowerShell v5 installed☆16Updated 9 years ago
- Docker projects to retain beacon source IPs using C2 relaying infra☆11Updated 6 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- Python wrapper for the Mitre ATT&CK framework API☆30Updated 7 years ago
- ☆12Updated 7 years ago
- windows-operating-system-archaeology @Enigma0x3 @subTee☆46Updated 8 years ago
- Scripts to query local admins quickly☆9Updated 9 years ago
- Detect kerberos attacks in pcap files☆29Updated 9 years ago
- Proof of concept communications from C# via a web browser process☆21Updated 6 years ago
- Server for receiving autorun data from the clients☆13Updated 7 years ago
- Microsoft Flow Attack Framework☆23Updated 5 years ago
- List (or plunder) private repos/gists to which a token has access, including those of other users☆11Updated 3 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- ☆30Updated 6 years ago
- Bro PCAP Processing and Tagging API☆28Updated 7 years ago
- hassh-utils: Nmap NSE Script and Docker image for HASSH - the SSH client/server fingerprinting method (https://github.com/salesforce/hass…☆58Updated 9 months ago
- The FastIR Server is a Web server to schedule FastIR Collector forensics collect thanks to the FastIR Agent☆12Updated 8 years ago
- Opening CobaltStrike to a wider world☆8Updated 7 years ago