mnemonic-no / SNIcatLinks
SNIcat
☆128Updated 4 years ago
Alternatives and similar repositories for SNIcat
Users that are interested in SNIcat are comparing it to the libraries listed below
Sorting:
- Stealthy data exfiltration via IPv6 covert channel☆102Updated 6 years ago
- Slack C2bot that executes commands and returns the output.☆46Updated 2 years ago
- Terraform resources for building HTTP, DNS, phishing, and mail server red team infrastructure☆95Updated 6 years ago
- Terraform script to deploy AD-based environment on Azure☆41Updated 2 years ago
- ☆69Updated 4 years ago
- Automated 802.1x Bypass☆85Updated 5 years ago
- ☆108Updated 4 years ago
- A progressive, customizable armored SSH tunnel implant for Linux and MacOS systems☆134Updated 6 years ago
- A cloud-backed password cracking and assessment tool - Sponsored by Open Security☆70Updated 2 years ago
- Post exploitation tool for configuration management servers.☆77Updated 2 years ago
- Mailpl0it is a small utility that hunts the homepage of exploit-db looking for user supplied quer(y/ies) and notifies the user via email …☆31Updated 3 years ago
- LLMNR/NBNS/mDNS Spoofing Detection Toolkit☆59Updated 3 years ago
- Manticore Adversary Emulation Cli☆48Updated 5 years ago
- Whalescan is a vulnerability scanner for Windows containers, which performs several benchmark checks, as well as checking for CVEs/vulner…☆155Updated 2 years ago
- Repository of resources for configuring a Red Team SIEM using Elastic☆101Updated 7 years ago
- Endpoint for Out-of-Band Exfiltration (DNS & HTTP)☆93Updated 6 years ago
- Joystick is a tool that gives you the ability to transform the ATT&CK Evaluations data into concise views that brings forward the nuances…☆64Updated 2 years ago
- A CLI tool for querying passive DNS services☆42Updated last year
- Simulating Adversary Operations☆96Updated 7 years ago
- Network assessment tool for various UDP Services covering both IPv4 and IPv6 protocols☆115Updated 5 years ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆21Updated 8 years ago
- A collection of scripts, and tips and tricks for hacking k8s clusters and containers.☆136Updated last year
- rules to identify files containing juicy information like usernames, passwords etc☆127Updated 7 years ago
- BloodHound Cypher Queries Ported to a Jupyter Notebook☆53Updated 5 years ago
- The SSH Multiplex Backdoor Tool☆65Updated 6 years ago
- Slides from my talk in "Hackinparis" 2019 edition☆91Updated 6 years ago
- ☆98Updated 6 years ago
- Packet communication investigator☆91Updated 2 years ago
- An epic web shell☆85Updated 4 months ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆95Updated 4 years ago