mnemonic-no / SNIcatLinks
SNIcat
☆128Updated 4 years ago
Alternatives and similar repositories for SNIcat
Users that are interested in SNIcat are comparing it to the libraries listed below
Sorting:
- Terraform resources for building HTTP, DNS, phishing, and mail server red team infrastructure☆95Updated 6 years ago
- Stealthy data exfiltration via IPv6 covert channel☆102Updated 6 years ago
- ☆108Updated 3 years ago
- Slack C2bot that executes commands and returns the output.☆46Updated 2 years ago
- ☆69Updated 4 years ago
- Automated 802.1x Bypass☆85Updated 5 years ago
- A progressive, customizable armored SSH tunnel implant for Linux and MacOS systems☆134Updated 6 years ago
- Terraform script to deploy AD-based environment on Azure☆41Updated 2 years ago
- A cloud-backed password cracking and assessment tool - Sponsored by Open Security☆70Updated 2 years ago
- Mailpl0it is a small utility that hunts the homepage of exploit-db looking for user supplied quer(y/ies) and notifies the user via email …☆31Updated 3 years ago
- Manticore Adversary Emulation Cli☆48Updated 5 years ago
- Post exploitation tool for configuration management servers.☆77Updated 2 years ago
- Whalescan is a vulnerability scanner for Windows containers, which performs several benchmark checks, as well as checking for CVEs/vulner…☆155Updated 2 years ago
- AvBuster The stress Tester for your Anti Malware solutions☆41Updated 4 years ago
- Slackhound allows red and blue teams to perform fast reconnaissance on Slack workspaces/organizations to quickly search user profiles, lo…☆83Updated 2 months ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆70Updated 3 years ago
- A Django application to help red team operators manage a library of domain names☆166Updated 2 years ago
- A collection of random bits of information common to many individual penetration tests, red teams, and other assessments☆110Updated 10 months ago
- Repository of resources for configuring a Red Team SIEM using Elastic☆101Updated 7 years ago
- rules to identify files containing juicy information like usernames, passwords etc☆127Updated 7 years ago
- An Insider Threat Toolkit☆153Updated 6 years ago
- The Cloud Blocker☆108Updated 7 months ago
- TA505+ Adversary Simulation☆65Updated 4 years ago
- ☆128Updated 2 years ago
- Endpoint for Out-of-Band Exfiltration (DNS & HTTP)☆93Updated 6 years ago
- d(ockerp)wn - a docker pwn tool manager☆156Updated 4 years ago
- Tool to find and extract credentials from phone configuration files hosted on CUCM☆106Updated 6 years ago
- An epic web shell☆85Updated 4 months ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆86Updated 4 years ago
- ☆116Updated 6 months ago