Detect and remove the presence of canary tokens
☆25Dec 9, 2023Updated 2 years ago
Alternatives and similar repositories for canarytokendetector
Users that are interested in canarytokendetector are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Automated (kinda) deployment of MalRDP infrastructure with Terraform & Ansible☆12Sep 15, 2023Updated 2 years ago
- Signature based honeypot detector tool written in Golang☆108Mar 22, 2025Updated last year
- Cobalt Strike/C2 Servers☆13Apr 22, 2021Updated 4 years ago
- Rehashing APIs to prevent hash based detection☆14Jan 7, 2025Updated last year
- Silver SAML forgery tool☆56Feb 26, 2024Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Exploit for elevation of privilege vulnerability in QuickHeal's Seqrite EPS (CVE-2023-31497).☆18Oct 30, 2023Updated 2 years ago
- Add Shadow Credentials to a target object by editing their msDS-KeyCredentialLink attribute☆25Jun 5, 2024Updated last year
- ☆25Apr 28, 2024Updated last year
- Passive DNS server interface compliant to "Common Output Format"☆10Sep 19, 2016Updated 9 years ago
- ReverseJS: A blog focused on reverse engineering Javascript☆11Feb 9, 2024Updated 2 years ago
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆23Jun 7, 2017Updated 8 years ago
- The NSE Script plugin integrates with Criminal IP CTI search engine for network scanning, showing IP details like WHOIS, running products…☆16Nov 29, 2023Updated 2 years ago
- BadExclusions is a tool to identify folder custom or undocumented exclusions on AV/EDR☆21Feb 8, 2024Updated 2 years ago
- ☆31Jul 26, 2024Updated last year
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- GhostLoader - AppDomainManager - Injection - 攻壳机动队☆53May 21, 2020Updated 5 years ago
- Eliminates most calls to common CDNs, by greatly increasing the time objects from the CDNs will remain in the browser cache☆16Mar 25, 2020Updated 6 years ago
- llolbas is a repo containing a localized and off-line version of the ever popular Living Off the Land Binaries and Scripts (LOLBAS) proje…☆12May 1, 2023Updated 2 years ago
- Quickly look up hashes in your terminal using the HashMob API 🔥☆13Apr 16, 2023Updated 2 years ago
- RedDrop is a quick and easy web server for capturing and processing encoded and encrypted payloads and tar archives.☆57Dec 17, 2024Updated last year
- A tool to monitor for potential spear phishing domains and send to Slack.☆23Feb 8, 2024Updated 2 years ago
- A command-line utility for working with URLs.☆10Dec 8, 2025Updated 3 months ago
- Socks proxy server using powershell. Supports local and reverse connections for pivoting.☆11Oct 7, 2020Updated 5 years ago
- [WIP] Adds physical storage device support to Netbox, primarily intended for SAS/SATA/NVMe type devices.☆12Mar 11, 2024Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A PoC to deploy a Sliver Agent with amsi bypass, process injection, hollowing and OpSec☆29Oct 2, 2024Updated last year
- A LAPS dumper written using the impacket library.☆32May 22, 2023Updated 2 years ago
- Kippo configured to be a backdoored netscreen☆11Dec 22, 2015Updated 10 years ago
- A DNS client which implemented DoT and DoH, with load balancing, DNS cache, custom ECS and HOSTs.☆13Sep 3, 2024Updated last year
- Free Advance encryptor for Anon Cloud☆16Jan 26, 2023Updated 3 years ago
- Attempt zone transfers on domains☆18Jul 12, 2021Updated 4 years ago
- A tool that supports finding and abusing whitelisted programs to allow arbitrary file writing into the executable folder of Antivirus sof…☆82Nov 1, 2025Updated 4 months ago
- ☆19Nov 7, 2024Updated last year
- Threat Hunting with ELK Workshop (InfoSecWorld 2017)☆65Oct 31, 2017Updated 8 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Carbon and Red theme for Gitea. Must be on Gitea version 1.14 and higher in order to use.☆13Oct 24, 2023Updated 2 years ago
- Yet Another Fake Honeypot written in Go☆10Dec 8, 2017Updated 8 years ago
- ☆14Nov 4, 2025Updated 4 months ago
- DFSCoerce exe revisited version with custom authentication☆42Jan 13, 2024Updated 2 years ago
- ent pure go sqlite3 driver☆13Mar 18, 2026Updated last week
- takes shellcode bad-bytes and banishes them, returning cleaned shellcode with preserved functionalities☆60Mar 1, 2026Updated 3 weeks ago
- BOF to decrypt Signal Desktop chat logs☆70Feb 20, 2025Updated last year