preludeorg / libraries
Prelude client side libraries
☆17Updated this week
Alternatives and similar repositories for libraries:
Users that are interested in libraries are comparing it to the libraries listed below
- Next Generation Phishing Tool For Internal / Red Teams☆35Updated 5 years ago
- Log4Shell IOCs from CERT Orange Cyberdefense Threat Intelligence Datalake☆18Updated 2 years ago
- A PowerShell script that checks for dangerous ACLs on system hives and shadows☆28Updated 3 years ago
- Data exfiltration and covert communication tool☆38Updated 2 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆72Updated 3 years ago
- A collection of scripts for the purpose of gathering open source intelligence, to be presented at GrayHat, BSides Denver, and Information…☆25Updated 4 years ago
- Indicators of Normality☆12Updated 2 years ago
- ☆27Updated 3 years ago
- Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding in…☆25Updated 2 years ago
- ☆28Updated 3 months ago
- PowerShell script that abuses browser bookmark synchronization as a mechanism for sending and receiving data between systems.☆16Updated 2 years ago
- Bloodhound Portable for Windows☆51Updated 2 years ago
- Visual Studio Code Microsoft Sysinternal Sysmon configuration file extension.☆51Updated last year
- ☆15Updated 3 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆114Updated 3 years ago
- Simple PowerShell script to enable process scanning with Yara.☆93Updated 2 years ago
- ☆23Updated last year
- Windows Security Logging☆43Updated 2 years ago
- THOR APT Scanner User Manual☆18Updated last week
- A simple bastion host setup designed for cloud-hosted lab environments.☆28Updated 4 years ago
- Issues to consider when planning a red team exercise.☆14Updated 7 years ago
- An Ansible role for installing Cobalt Strike.☆78Updated last month
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆37Updated last year
- This is the official repository for Basic Malware Analysis Course☆19Updated 3 years ago
- Pointer was developed for massive hunting and mapping Cobalt Strike servers exposed on the internet.☆65Updated 3 years ago
- ☆41Updated last year
- Go reverse shell for Win/Linux/OSX☆17Updated 5 years ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆69Updated 3 years ago
- Triaging Windows event logs based on SANS Poster☆39Updated 2 years ago