mnemonic-no / SNIcatLinks
SNIcat
☆128Updated 4 years ago
Alternatives and similar repositories for SNIcat
Users that are interested in SNIcat are comparing it to the libraries listed below
Sorting:
- Terraform resources for building HTTP, DNS, phishing, and mail server red team infrastructure☆95Updated 6 years ago
- Terraform script to deploy AD-based environment on Azure☆41Updated 2 years ago
- Automated 802.1x Bypass☆87Updated 5 years ago
- Stealthy data exfiltration via IPv6 covert channel☆103Updated 6 years ago
- Mailpl0it is a small utility that hunts the homepage of exploit-db looking for user supplied quer(y/ies) and notifies the user via email …☆31Updated 3 years ago
- Slack C2bot that executes commands and returns the output.☆47Updated 2 years ago
- ☆69Updated 4 years ago
- ☆108Updated 4 years ago
- Whalescan is a vulnerability scanner for Windows containers, which performs several benchmark checks, as well as checking for CVEs/vulner…☆156Updated 2 years ago
- Repository of resources for configuring a Red Team SIEM using Elastic☆101Updated 7 years ago
- A progressive, customizable armored SSH tunnel implant for Linux and MacOS systems☆134Updated 6 years ago
- AvBuster The stress Tester for your Anti Malware solutions☆41Updated 4 years ago
- A Django application to help red team operators manage a library of domain names☆167Updated 2 years ago
- A dockerized, improved version of the Impacket smbserver.py☆39Updated 6 years ago
- A cloud-backed password cracking and assessment tool - Sponsored by Open Security☆71Updated 3 years ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆70Updated 3 years ago
- An Insider Threat Toolkit☆155Updated 7 years ago
- Manticore Adversary Emulation Cli☆47Updated 5 years ago
- The SSH Multiplex Backdoor Tool☆65Updated 6 years ago
- Post exploitation tool for configuration management servers.☆77Updated 2 years ago
- C# User Simulation☆33Updated 3 years ago
- Blue Pigeon is a Bluetooth-based data exfiltration and proxy tool to enable communication between a remote Command and Control (C2) serve…☆55Updated 4 years ago
- Endpoint for Out-of-Band Exfiltration (DNS & HTTP)☆93Updated 7 years ago
- A collection of random bits of information common to many individual penetration tests, red teams, and other assessments☆113Updated last year
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆24Updated 4 years ago
- rules to identify files containing juicy information like usernames, passwords etc☆128Updated 7 years ago
- Simulating Adversary Operations☆97Updated 7 years ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆21Updated 8 years ago
- DeepSea Phishing Gear☆122Updated 5 years ago
- LLMNR/NBNS/mDNS Spoofing Detection Toolkit☆60Updated 3 years ago