mark-ignacio / bedr
a BPF-based Linux syscall monitor
☆10Updated 5 years ago
Related projects: ⓘ
- Slides from my AD Privesc talk at WAHCKon 2017☆16Updated 7 years ago
- ☆30Updated 6 years ago
- ☆14Updated this week
- Duo MFA auditing tool to test users' likelihood of approving unexpected push notifications☆13Updated 6 years ago
- List (or plunder) private repos/gists to which a token has access, including those of other users☆11Updated 2 years ago
- A Windows REG file to enable all default PowerShell logging on a system with PowerShell v5 installed☆16Updated 8 years ago
- Docker projects to retain beacon source IPs using C2 relaying infra☆11Updated 5 years ago
- Python parser for Red Canary's Atomic Red Team Yamls☆27Updated 5 years ago
- Parsing MITRE EDR Evaluation results☆12Updated 5 years ago
- windows-operating-system-archaeology @Enigma0x3 @subTee☆44Updated 7 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 3 years ago
- DNS server limitation mapper☆25Updated 5 years ago
- A CLI tool for querying passive DNS services☆41Updated 9 months ago
- SilkETW & SilkService☆40Updated 5 years ago
- Environmental (and http) keying for scripting languages☆39Updated 5 years ago
- Detect kerberos attacks in pcap files☆27Updated 8 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Updated 7 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Updated 5 years ago
- Opening CobaltStrike to a wider world☆8Updated 6 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆11Updated 3 years ago
- ☆32Updated this week
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 3 years ago
- ☆11Updated 8 years ago
- Ansible scripts to build an attack box☆22Updated 5 years ago
- Nashorn Post Exploitation☆31Updated 6 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Exfiltration Framework - Exfiltration modeling tool written in Python. Naisho attempts to avoid detection from DLP, IPS/IDS egress filter…☆37Updated 9 years ago
- B-Sides CBR 2018 talk about group policy and Grouper☆39Updated 5 years ago