michael2to3 / c2-search-netlas
Search for c2 servers based on netlas
☆39Updated last year
Related projects: ⓘ
- RCE PoC for Empire C2 framework <5.9.3☆25Updated 6 months ago
- ☆50Updated 5 months ago
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆64Updated 2 years ago
- ☆19Updated this week
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious process☆63Updated 4 months ago
- CIS Benchmark testing of Windows SIEM configuration☆44Updated last year
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆74Updated last year
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆45Updated 2 years ago
- Unfixed Windows PowerShell Filename Code Execution POC☆40Updated 8 months ago
- ☆50Updated 11 months ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated last year
- Repository for archiving Cobalt Strike configuration☆28Updated this week
- Analyzing AD domains for security risks related to user accounts☆63Updated last year
- CVE-2024-23108: Fortinet FortiSIEM Unauthenticated 2nd Order Command Injection☆31Updated 3 months ago
- Searching .evtx logs for remote connections☆23Updated last year
- ☆28Updated last year
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Updated last year
- Proof of Concept for CVE-2023-23397 in Python☆27Updated last year
- ☆18Updated 5 months ago
- badger-builder is an AI-assisted tool for generating dynamic Brute Ratel C4 profiles☆53Updated 2 months ago
- ☆26Updated last month
- A PoC for achieving persistence via push notifications on Windows☆43Updated last year
- Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831)☆39Updated last year
- BloodHound PowerShell client☆43Updated this week
- ☆31Updated this week
- Yet Another Memory Analyzer for malware detection☆24Updated last year
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆38Updated last year
- vulnlab.com reaper writeup☆25Updated last year
- ☆57Updated 6 months ago
- a variety of tools,scripts and techniques developed and shared with different programming languages by 0xsp Lab☆55Updated 5 months ago