mnemonic-no / SNIcat
SNIcat
☆126Updated 3 years ago
Alternatives and similar repositories for SNIcat:
Users that are interested in SNIcat are comparing it to the libraries listed below
- Terraform resources for building HTTP, DNS, phishing, and mail server red team infrastructure☆94Updated 5 years ago
- Login Pages Database forms a knowledge base on login pages related to malicious activities (C2 panels, phishing kits...).☆39Updated 2 years ago
- HoneyCreds network credential injection to detect responder and other network poisoners.☆216Updated 3 years ago
- ☆69Updated 3 years ago
- A progressive, customizable armored SSH tunnel implant for Linux and MacOS systems☆132Updated 5 years ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆69Updated 3 years ago
- Stealthy data exfiltration via IPv6 covert channel☆103Updated 5 years ago
- Automated 802.1x Bypass☆84Updated 5 years ago
- A list of JARM hashes for different ssl implementations used by some C2/red team tools.☆139Updated last year
- Mailpl0it is a small utility that hunts the homepage of exploit-db looking for user supplied quer(y/ies) and notifies the user via email …☆31Updated 2 years ago
- A collection of scripts for dealing with Cobalt Strike beacons in Python☆168Updated 4 years ago
- Zombie Ant Farm: Primitives and Offensive Tooling for Linux EDR evasion.☆225Updated 5 years ago
- Network assessment tool for various UDP Services covering both IPv4 and IPv6 protocols☆116Updated 5 years ago
- ☆128Updated last year
- Simulating Adversary Operations☆93Updated 6 years ago
- Valhalla API Client☆68Updated 2 years ago
- ☆108Updated 3 years ago
- The SSH Multiplex Backdoor Tool☆63Updated 5 years ago
- Slack C2bot that executes commands and returns the output.☆46Updated 2 years ago
- A Django application to help red team operators manage a library of domain names☆162Updated last year
- Linux Local Privesc Helper and Agent☆165Updated 5 years ago
- ☆97Updated 4 years ago
- A simple python tool based on Impacket that tests servers for various known NTLM vulnerabilities☆203Updated 4 years ago
- Website crawler with YARA detection☆88Updated last year
- d(ockerp)wn - a docker pwn tool manager☆155Updated 3 years ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆112Updated 5 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆72Updated 3 years ago
- Cybersecurity Incidents Mind Maps☆33Updated 3 years ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆140Updated last month
- Blue Pigeon is a Bluetooth-based data exfiltration and proxy tool to enable communication between a remote Command and Control (C2) serve…☆55Updated 3 years ago