A CALDERA Plugin Template
☆20Jan 7, 2026Updated 2 months ago
Alternatives and similar repositories for skeleton
Users that are interested in skeleton are comparing it to the libraries listed below
Sorting:
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆23Jul 31, 2025Updated 7 months ago
- 🐐 Intrusion Detection System☆17Jan 10, 2023Updated 3 years ago
- 🦅 Falcon Malware Sandbox APIv2 Connector☆31Mar 22, 2023Updated 2 years ago
- This program detects if any security software (AV, EDR, XDR, firewall, etc.) is running on the system. The program searches the list of r…☆50Jan 13, 2026Updated 2 months ago
- Easily scan with multiple yara rules from different sources.☆14Mar 9, 2024Updated 2 years ago
- Look into EDR events from network☆25Nov 20, 2025Updated 4 months ago
- 🦊A cloudflare DNS over HTTPs resolver client library.☆12Jan 10, 2023Updated 3 years ago
- Python Library for ConfigExtractor☆15Feb 24, 2026Updated 3 weeks ago
- An error propagating JSON parsing library for Go☆15Oct 14, 2022Updated 3 years ago
- A golang CLI to setup honey pots https://en.wikipedia.org/wiki/Honeypot_(computing)☆16Jul 19, 2020Updated 5 years ago
- Normalizer for honeypot data.☆11Dec 6, 2023Updated 2 years ago
- A template repository for building external data providers for Gatekeeper.☆12Aug 14, 2023Updated 2 years ago
- Loading unmanaged dll (32 and 64bits) in managed exe☆11Dec 12, 2020Updated 5 years ago
- Threat Modeling with ATT&CK defines how to integreate MITRE ATT&CK® into your organization’s existing threat modeling methodology.☆12May 28, 2025Updated 9 months ago
- This CALDERA Plugin converts Adversary Emulation Plans from the Center for Threat Informed Defense☆34Updated this week
- Go library to allow native inline hooking in windows at runtime☆14Feb 7, 2024Updated 2 years ago
- Generate invoice using Go☆13May 26, 2021Updated 4 years ago
- ☆12Dec 7, 2022Updated 3 years ago
- Public exploits☆16May 28, 2018Updated 7 years ago
- ☆27Aug 8, 2021Updated 4 years ago
- ☆21Apr 8, 2019Updated 6 years ago
- 利用chrome扩展 dump 浏览器cookie https://saucer-man.com/information_security/787.html☆15Sep 9, 2021Updated 4 years ago
- Some scripts for using Tornado Cash from the command line, but written in TypeScript and with fewer crazy dependencies.☆16Feb 21, 2025Updated last year
- A proof-of-concept re-assembler for reverse VNC traffic.☆24May 21, 2023Updated 2 years ago
- Windows Research Kernel☆14Apr 1, 2016Updated 9 years ago
- arm64 and arm64e dylib injector☆41Feb 6, 2024Updated 2 years ago
- Public Exploits☆10Apr 6, 2021Updated 4 years ago
- A Python package is used to execute Atomic Red Team tests (Atomics) across multiple operating system environments.☆140Jul 17, 2024Updated last year
- Solana Dex Info for arbitrage bot☆18Sep 6, 2025Updated 6 months ago
- .Net Assembly loader for the GMSAPasswordReader☆19Feb 15, 2023Updated 3 years ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆75Jun 27, 2023Updated 2 years ago
- A collection of repositories used to make ISTS 16 possible.☆15Feb 13, 2018Updated 8 years ago
- A collection of tutorials, CTFs, wargames, articles, and other resources for Smart Contract security.☆14Jun 4, 2022Updated 3 years ago
- doesnt work and wont work on it anymore☆10Jul 8, 2024Updated last year
- A static analysis framework for NASL.☆14Nov 30, 2022Updated 3 years ago
- Threat Simulation Indexes☆39Jan 9, 2026Updated 2 months ago
- vmware-backdoor☆33Jul 11, 2021Updated 4 years ago
- Go Windows API Examples☆21Apr 23, 2023Updated 2 years ago
- A Windows batch file multi-tool that aids you in your experience with a Windows Machine.☆10Dec 10, 2021Updated 4 years ago